Return to Basics: Email Security in the Post-COVID Workplace

Return to Basics: Email Security in the Post-COVID Workplace
As we reimagine the post-pandemic workplace, we must also reevaluate post-pandemic email security practices.

As 2020 began, businesses couldn't have predicted the disruption they were about to experience. As the COVID-19 pandemic struck, companies scrambled to adapt their infrastructure and technology to keep newly virtual employees connected and productive. Once long-term office closures became unavoidable, business leaders had to establish long-term connectivity and security procedures for their virtual workforce.


Eighteen months later, as vaccination rates rise and infection rates fall, businesses are making plans to reopen their offices. But few companies plan to return to their pre-pandemic status quo of an office full of employees. Uncertainty persists as companies adapt to changing regulations, determine who can work hybrid schedules, and assess which roles can remain remote. We can be certain that cybercriminals are watching these developments carefully, making plans for where to strike during the transition.


Regardless of physical location, employees will continue to require reliable access to business applications. Cybercriminals will take advantage of this transition. They will determine the best methods and times to attack those who are navigating the learning curve of new cloud-based systems.


As we reimagine the post-pandemic workplace, we must also reevaluate post-pandemic email security practices. We must ensure that networks remain protected, regardless of whether employees are working from corporate headquarters or from their dining room table.


Changing Workplace DynamicsCOVID-19 drove radical changes in how and where people work. According to a survey of Fortune 500 executives, only about 16% of employees were working remotely before the pandemic. After March 2020, this number grew to over 65%. Many who previously relied on office computers had to quickly learn to access work applications from home computers, la ..

Support the originator by clicking the read the rest link below.