What about corporate data at home?

1 March 2020 IT infrastructure

Many companies and government agencies have already sent employees home to work remotely in response to concerns about the coronavirus. This week, thousands of additional employers will likely follow suit until concerns about the contagion ease. The International Association of IT Asset Managers (IAITAM) is warning that most employers may have rushed into making their decision without thinking through how to secure their most sensitive data.

Dr. Barbara Rembiesa, president and CEO of IAITAM, said: “We always say that you can’t manage what you don’t know about and that is going to be a truth with nightmare consequences for many companies and government agencies struggling to respond to the coronavirus situation. The impulse to send employees home to work is understandable, but companies and agencies without business continuity (BC) plans with a strong IT Asset Management (ITAM) component are going to be sitting ducks for breaches, hacking and data that is out there in the wild beyond the control of the company.”

As an example, Rembiesa cited a 2015 IAITAM report that found 17 percent of U.S. Securities and Exchange Commission (SEC) laptops were not where they were supposed to be and 22 percent had incorrect user information. The Washington, D.C. office of the SEC sent all employees home to work last week due to the discovery of a coronavirus case in the agency’s headquarters. Under the circumstances cited in the IAITAM report, the SEC would have little confidence that it knows who is working remotely on which machines and under what circumstances.

Prepared for home operations

If your company is sending home people with equipment, IAITAM has this advice:

1. Sign out and track all IT assets that are being taken home. No IT assets should be allowed to leave a company site for the first time without formally accounting for each movement.

2. Make sure solid firewall and passcode protections are in place for accessing company systems. Companies and agencies that plan properly will 'scale up' to accommodate a shift in traffic from the workplace to remote access.

3. Consider requiring employees to sign a Non-Disclosure Agreement (NDA) about the data they will have access to outside the office. The data is often significantly more valuable than the IT assets in which it is contained. Vital company information may be at stake and an NDA sends a message to employees that they have serious responsibilities that must be honoured and respected.

4. Provide education and training to employees about how to responsibly manage their equipment and the company’s data. For example, parents who are accustomed to allowing a child or spouse to use a personal smartphone or computer must be coached to avoid doing so with company IT assets. Companies may also elect to forbid the use of company IT assets on public Wi-Fi networks, such as coffee shops and fast-food restaurants.

5. Monitor employee data use and other remote practices. It would be nice to assume everyone will follow the rules and be a team player, but that doesn’t always happen. Any potential for mischief or data abuse may be heightened in a work-from-home environment. Remember that most data breaches are caused by insiders, not outside hackers.

6. Tighten the reins on Bring Your Own Device (BYOD) practices. The reality is that the longer someone is out of the office, the more likely it is that they will do company business on their personal smartphone, computer, tablet or other BYOD asset. A BYOD device could simply be a personal phone that receives work emails. If the employee’s contract or policy language does not give the data rights to the organisation, the IT Asset Manager will need to make an addendum giving the rights to the organisation. The employee may own the device, but the work-related data is 100 percent owned by the company.

Without work-from-home plans

What about companies and government agencies that did not invoke their BC plans with ITAM protections built in, and are now sending employees home to work things out as best one can on their own personal devices? (This could also apply to companies and agencies that have such plans in place, and ITAM, but rushed ahead out of coronavirus fears and did not call on the protective provisions.) For those companies and agencies, the list of potential problems is long:

1. Companies and agencies will have little or no information about the devices being used to conduct company business. In the absence of the most basic mobile device management (MDM) system, companies will be almost completely blind as to who is accessing their data.

2. Companies and agencies that do not require their workers to operate remotely through a virtual private network (VPN) will be relying on personal Wi-Fi systems that may be entirely insecure and/or already corrupted. Unprepared companies may also find that their VPNs are unprepared for a tidal wave of outside access. Companies that allow employees to use BYOD devices to do business on public Wi-Fi systems may be even more vulnerable to attack.

3. The longer employees are working remotely in a vulnerable state, the bigger a target they may become for phishing and other attacks. Already, there have been countless coronavirus-related attacks. Those working at major companies and government agencies may find themselves in the crosshairs of such sophisticated schemes. In the absence of training and ongoing guidance from their company, the sensitive data on personal devices could be at considerable risk.

4. Data on personal devices (outside the reach of a company or government agency) likely will remain there when the employee returns to work. This creates a huge risk if the personal device is 'handed down,' sold to a third-party or improperly disposed of. In these scenarios, the exposure of sensitive company data may be entirely unintentional and end up becoming public.

For more information, visit www.iaitam.org.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Open source software as a tool for growth
Issue 2 2020 , IT infrastructure
Open source technology forms a part of virtually all IT applications and devices on the planet, and even runs the internet.

Read more...
5G security is all-important for governments
Issue 2 2020 , IT infrastructure
The 5G revolution is about to flip us from a society that 'uses networks' to one that 'runs on networks'.

Read more...
Unlocking the potential of IoT
Issue 2 2020 , IT infrastructure
With the potential economic impact of IoT estimated to top $11 trillion annually by 2025, local companies must see IoT as a strategic priority.

Read more...
Small server solution for small, remote businesses
Issue 2 2020 , IT infrastructure
HPE powers small businesses and remote office locations with monthly subscription for secure, easy-to-use IT solutions.

Read more...
The risk of dark data
Issue 2 2020 , IT infrastructure
Cloud adoption rises as businesses aim to reduce data protection costs, but many miss this benefit as they use cloud as a dumping ground for ‘dark’ and redundant, obsolete and trivial (ROT) data.

Read more...
The risk of dark data
Issue 2 2020 , IT infrastructure
Cloud adoption rises as businesses aim to reduce data protection costs, but many miss this benefit as they use cloud as a dumping ground for ‘dark’ and redundant, obsolete and trivial (ROT) data.

Read more...
Video surveillance multicast networks made easy
Issue 1 2020, Duxbury Networking , IT infrastructure
Many businesses are struggling to realise the full potential of modern video surveillance technology due to limitations of the underlying network.

Read more...
Three data protection predictions for 2020
Issue 1 2020 , IT infrastructure
Byron Horn-Botha from Arcserve Southern Africa relates the company’s top three data predictions to be on the alert for in 2020.

Read more...
An open foundation for 2020
Issue 1 2020 , IT infrastructure
The migration to open hybrid cloud technologies will be the way to go as we head into the new decade.

Read more...
Will 5G be the answer to all prayers?
Issue 1 2020 , IT infrastructure
There is a lot of understandable confusion about the role Wi-Fi will play once 5G arrives, and how they might work together.

Read more...