Guarding critical data when employees WFH

Issue 4 2021 Access Control & Identity Management

To say that the Covid-19 pandemic has changed the face of business forever would be the under-statement of the century. As a result of this pandemic, working-from-home scenarios have increased dramatically. Don’t leave this page just yet, this is not so much about ‘remote working’ as it is about the sheer volume of people and businesses that have been affected by these changes.


Claude Langley.

While countless organisations across various industries had been practising working-from-home scenarios long before the pandemic struck, other organisations were forced into taking this drastic step. Not only did they have to ensure the physical health and safety of their employees amidst the spreading of FUD (fear, uncertainty and doubt), secure their working environments by buying masks, a variety of new hand soaps, sanitisers, temperature meters and all the other pandemic-paraphernalia, but most organisations were also scrambling to try and ensure business continuity. This meant making plans and putting new processes in place to ensure that the business could continue as smoothly and normally as possible. For many this meant putting employees on rotating shifts, buying and setting up home-offices and serious headaches for their IT teams.

Also, don’t forget about PoPIA (South Africa’s new Protection of Personal Information Act). The implementation of this act could only add to the headaches (and heartaches, I am sure, for many) IT and security teams at organisations across the country had to burn the midnight oil to ensure that those employees who (depending, of course, if the position allows for it) were able to, could work from home and business could (nearly) continue as normal.

In the meantime, another lockdown struck us with a potential further one at the end of the year. More businesses and employees have turned to permanently working from home. Just when the dust started to settle and the ‘new normal’ started to feel like it has always been the norm, the country was literally and figuratively on fire during the recent looting and political unrest and even more employees and businesses were directly affected.

Businesses leaders now know that this pandemic is not going to go away any time soon. So typical of our passionate South African culture, most have taken pro-active steps to ensure that their employees can work from home amidst the chaos. In fact, a recent study highlighted that South Africa has emerged as one of the countries that would embrace fully remote work, with 44% saying they’d like to continue working fully remotely, compared to the global average of 24%. Around 38% of the country’s active workforce is now able to work from home, compared to the mere 4% before the pandemic. Employers estimate that 33% of their employees would still be working from home in three years’ time.

However, this ‘new normal’ brings it owns headaches and challenges. Employees working from home and being efficient is one thing – employees working from home with access to critical and sensitive data, posing potential security risks, can unfortunately open Pandora’s box.

While most of our country’s businesses have taken steps to put policies in place to ensure the safety and security of data, many continue to rely only on passwords. Although passwords continue to be a crucial element of living in a modern world to help protect our identities, they often come with a level of frustration, since our increasingly connected and digital world requires remembering countless passwords for different systems.

As 40% of professionals in South Africa have expressed their desire to move to full-time remote working, with a further 27% wanting at least 50% remote working this year, it is possible for businesses to implement solutions that will allow those employees working on digital devices outside of the safety of the traditional office environment, to have a single-sign-on (SSO) solution, which supports password-less authentication. Employees can authenticate their identities with the touch of a finger as biometric fingerprint readers can be employed to validate employees’ fingerprints and offer an end-to-end solution to transform how organisations protect their digital integrity.

The past year and a half has taught us many hard lessons. We have changed our way of life to suit the needs of the evolving global community. We must embrace these changes if we are to prosper in our new world and find new ways of ensuring our digital freedom and security.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...
Inside the RealScan SG10
neaMetrics Access Control & Identity Management Products & Solutions
The SG10 was optimised for speed at every stage, from capture to processing. The result is faster fingerprint acquisition and near-instant response for operators.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Directory of access and identity management suppliers 2025
Access Control & Identity Management
The Directory of Access and Identity Management Suppliers 2026 includes the details of companies that provide products, advice and services to the access control and identity management market.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.