Return to base: the ultimate guide to preparing a COVID-19 exit strategy

Return to base: the ultimate guide to preparing a COVID-19 exit strategy



While governments and public healthcare specialists are looking into the timing and manner of reopening the economy, it is clear that at some point in the hopefully not-too-distant future restrictions will be eased and businesses will return to normal operations. However, just as the shift to working from home required organisations to adapt and act differently, so will the return to the office. In this article, we discuss the preparation CISOs should consider making to offset a number of security implications that arise from returning your workforce from home and back to the office.


Making Sure Returning Devices Are Safe To UseWhen returning to the office, employees will haul back all the IT equipment they have used at home. Some of this is trivial office equipment like screens, docking stations and cables, but computing devices can be a security blindspot.


Rogue Devices: While unknown connected devices pose a security risk at all times, the return to the office represents an even bigger risk. Whilst at home, such devices may not pose a serious security risk, but if they are introduced to the corporate network, they could become one.


Home Laptops: Some employees working from home may have had to use their own laptops, either because in the rush to vacate offices the IT department might not have had sufficient inventory or just through personal preference. In such cases, they are likely to bring these laptops with them when they return to the office, plug them into the corporate network and continue to work as they had been doing at home. These devices could potentially be infected with malware if they have not been running updated, corporate-grade EDR solutions – install NAC ..

Support the originator by clicking the read the rest link below.