With the current shift of office employees toward working from home, an increased number of devices are no longer guarded by the usual protections of corporate networks. This exposes companies to greater endpoint security risks from cyberthreats that can attack via unsecured employee devices.
While some IT administrators are prepared for managing and securing remote teams of employees, others may need to either catch up or perhaps review any changes made in haste. Regardless of the stage of preparedness and response, businesses can better understand how the security posture of their companies stands in relation to the tools available for cybercombat by using a three-tiered risk assessment.
Understanding and being strategic about which risks your business can handle helps you to assess what security gaps are still existing and what tools you should be looking for to handle those risks.
Outlining endpoint security risks
Depending on available company resources and policy, sending an employee to work from home may mean transitioning your workforce, at least partly, to a bring your own device (BYOD) model. In other words, if there aren’t enough corporate laptops and mobile devices to go around, employees may need to use personal devices to carry out work at home. This may especially be the case for small offices/home offices (SOHOs), or even larger businesses, should device stocks run out.
In such situations, the same security measures that should be in place at any business remain essential. Employees need to have security solutions on each desktop, notebook or mobile device that they use to handle your business’ digital assets.
The risks of not being protected at this basic level are too great. Users are exposed to various online dangers ranging from phishing links found in emails or social media to malicious websites, ads and other malware. A security solution acts as a proactive threat detection system that can handle these threats.
Endpoint security solutions should be installed on all work-related devices
Employers should ensure that endpoint security software, like ESET Endpoint Security, is installed on employees’ devices. If that is not a viable option, employees should have consumer-grade security software like ESET Internet Security or, at the very least, a free trial of such software.
For employees using mobile devices for work, the same principles apply. Employers can protect Android-powered devices with anti-virus solutions such as ESET Endpoint Security for Android. Again, employees could also run a consumer-grade version like ESET Mobile Security for Android, which continues to protect phones with a robust free version even if the premium trial expires.
iOS-powered devices, however, cannot be protected by anti-virus software. IT administrators will need to leverage the remote configuration options via remote management tools to stay on top of Apple’s mobile devices.
When do SOHOs start to benefit from upgrading to business-grade products?
In the smallest setups, a business has a few employees, and devices are likely protected by consumer-grade security solutions. But, either as the business grows or when employees regularly work away from the office, a few pain points can arise:
- Work computers have limited file storage capacity, meaning that employees will be tempted to store files in personal cloud storage accounts.
- Employees could transfer files to USB disks and other external storage devices. These devices are usually unencrypted and may have personal files mixed in or be infected with malware.
- Collaboration on files via email threads starts to become messy, and versions of the same file multiply.
All these pain points push the business to deploy a central place – a file server – where employees can securely store, access, collaborate and work on files. File server solutions are various, but they usually take one of two basic forms:
- Businesses subscribe to a cloud business storage account via OneDrive, Dropbox, Google Drive or another similar platform.
- Businesses provision an on-premises file server.
Both of these options come with their own level of risk and security considerations, but the transformative effect they have is to push businesses toward a server-endpoint infrastructure – the beginnings of a true corporate network.
How small businesses benefit from a corporate network structure
Business security solutions start to play a larger role in this new kind of setup because, unlike consumer software, business solutions view individual employee devices as endpoints in a network – all interconnected through one or more servers. Servers, along with endpoints, need protection, and the new IT setup – offering shared resources hosted and accessed from centralized servers – demands extra security. So, now the benefits of business-grade solutions start to kick in and unlock the door to more robust security features.