Since lockdown came into effect, organizations globally have undergone years' worth of transformations in a matter of months. Whether it’s been to transition their operations online or moving their IT infrastructure to the cloud, there’s no denying that the face of business has changed permanently, experiencing a seismic shift, both operationally and culturally. As we enter the “next normal” there remains a great deal of uncertainty around what the next twelve months holds and how organizations can navigate turbulence in the face of a possible recession.

One of the most notable and widely reported trends has been the switch to remote methods of work, or home working. And even with news of some businesses returning to their places of work and office spaces opening at reduced capacity, it’s widely speculated that for some, the home office environment is here to stay.

Lower operational costs, greater flexibility and productivity driven

For the vast majority, however, working from home is an entirely new process. In fact, a recent survey from IBM revealed that more than 80% of respondents either rarely worked from home or not at all prior to the pandemic. And in turn, more than half are now doing so with their personal laptops and devices. While the benefits of a more remote workforce are well documented – lower operational costs, greater flexibility and productivity driven by being able to access shared workspaces and applications from anywhere, at any time, and on any device – it does represent a sizeable concern in terms of security and data protection.

An evolving threat landscape

In the IBM survey, it was also revealed that organizations had not implemented any new security policies to help guide their staff when it comes to handling sensitive customer data and password management. And with so many employees logging on from residential networks, through personal devices that may be more easily compromised, the overall attack surface has greatly increased, raising the risk of potential corporate and sensitive data leakage in their new home office settings.

The challenge is that bad actors love this new reality, as employees are far more likely to fall victim to a cyberattack when working outside of the office’s firewall. A survey released by INTERPOL, showed that cybercrime had grown at an “alarming pace” as a result of the COVID-19 pandemic, with a particularly large increase in phishing scams/fraud (59%), malware/ransomware (36%), malicious domains (22%), and fake news (14%). And this should be real cause for concern for organizations, because should one employee fall victim to a data breach through a scam or spear phishing attempt, for example, that company will be liable to pay potentially huge fines in line with national data regulatory standards.

In April this year, the UK’s data protection watchdog, the Information Commissioner’s Office (ICO) and the EU, did both announce that they would temporarily soften their enforcement of the GDPR. However, this was not a cause for organizations to become complacent and neglect the data protection policies they had worked so hard to implement in their office environments. The momentary change actually means very little in terms of the critical importance of safeguarding private and sensitive data.

Don’t slip into bad habits

It’s essential that all organizations implement proper audit trails to track and account for any and all data

It’s fair to expect that the move to a home office will inevitably make employees feel, well, more at home. And with that might come a relaxation in their approach to data management best practices and the adoption of a few bad habits. One thing to consider about a remote workforce, is it’s highly likely that everything will be saved to a desktop as temporary data or in permanent folders, particularly if access to central, cloud-based workspaces and platforms is impaired or restricted.

The issue here is that this can impair an organization’s chain of custody over its organizational and customer data. It’s essential that all organizations implement proper audit trails to track and account for any and all data in their possession. With data stored locally on a device and off-premises, this data immediately becomes harder to audit and presents a significant risk to the organization. It’s crucial that both the organization and its employees understand how to actively clean up this type of environment. Managing documents through centralized cloud-based workspaces, is a much better way to continuously manage data stored.

What this all comes down to is a need to account for the significant cultural shift all organizations are experiencing. While certain aspects of our day-to-day working life certainly won’t be business as usual, an area that can’t slip is data management and the safeguarding of private data. Ensuring that privacy is ingrained in all processes, new and existing, and maintaining the mantra that security should be every employee’s top priority is crucial. Give data privacy the time and respect it deserves, make it part of the company’s culture, and a compliant, secure workforce will follow.

Basic hygiene and remote solutions = a healthy remote workforce

So, what is the best way to ensure a remote workforce is following data management best practices and keeping home offices secure? Primarily it comes down to following many of the basic hygiene practices and guidelines that organizations should already be following. Don’t sit on sensitive data in your home office that is not needed and no longer holds any value to the business. Maintain a full audit trail of any and all data from point of collection, right through to end-of-life and erasure. And ultimately carry out the permanent and irreversible erasure of data when it becomes redundant, obsolete, or trivial (ROT), to reduce your risk – in fact, it’s completely possible to carry out certified data erasure of selected data remotely.

Don’t sit on sensitive data in your home office that is not needed

Equally, a lot of concerns about ensuring your workforce is following security protocols and maintaining regulatory compliance can be alleviated through tools and processes that you don’t even have to think about. Appropriate methods of data sanitisation can be achieved through automated solutions that can be pushed out by administrators to help continuously protect employees in the background, without the need for a significant shift or change from normal routines. Remote erasure practices also enable the sanitisation of devices that reach end-of-life, these can then be transported to the device processor without the threat of sensitive data being intercepted.

In these uncertain times, organizations will undoubtedly be challenged in new ways, but it’s vital that they don’t fall victim to new data management challenges and risk facing wholly avoidable fines from data breaches. Security and achieving compliance have always been about the journey, not the destination, and this is yet another step in that journey. It won’t happen overnight, and it must be a company-wide effort. Employee education is essential, and privacy should be built into every part of the organization across departments, not just across IT or legal departments.

Download PDF version Download PDF version

Author profile

Fredrik Forslund VP Enterprise & Cloud Erasure Solutions, Blancco

In case you missed it

The Growing Popularity Of Personal Safety Apps
The Growing Popularity Of Personal Safety Apps

The past year has elevated consumer awareness about personal safety, from COVID-19 issues to social unrest, making safety top-of-mind and the need for personal safety solutions, even more prevalent. In addition, consumers spent more time at home, as schools closed, events were canceled and remote work increased. This prompted two major shifts that, in my opinion, most significantly opened the need for and raised the popularity of mobile safety solutions. Demand for grocery and food delivery apps surged Rise in use of app-based delivery services During the past 18 months, the use of app-based delivery services has skyrocketed During the past 18 months, the use of app-based delivery services has skyrocketed. With more use comes more interactions among strangers in homes and businesses, and while the majority of these moments are completely safe and convenient, incidents are happening, ranging from uncomfortable situations to physical assaults.   And, with more delivery drivers on the road, there are going to be more accidents among gig-economy workers. Based on recent estimates, food and grocery delivery are expected to remain popular, even as we get back to normal life. High popularity of mobile security apps and wearables With more work shifting from stationary locations to working on-the-go, mobile security apps or wearables can be a lifeline in all sorts of situations. It’s important for these mobile safety products to be comprehensive, dynamic and designed to address the full range of people’s safety and security needs, from providing simple human reassurance to dispatching emergency help. Domestic violence cases increased According to the National Domestic Violence Hotline, due to COVID-19 lockdown restrictions, domestic violence rose as a result of many victims being stuck at home with their abusers, while sheltering in place and working from home. Mobile safety apps, such as ADT’s SoSecure U.S. Attorneys General and other state-elected officials have endorsed mobile safety apps, like SoSecure by ADT These situations necessitate the need for discreet ways for victims to call for help. U.S. Attorneys General and other state-elected officials have endorsed mobile safety apps, like SoSecure by ADT, as a tool to help victims of domestic abuse, safely call for help, without alerting their abuser. Over the past year, the mobile safety app market has seen tremendous innovation, including more user-friendly ways to make SOS calls. Today, within a single app, a person can summon help hands-free, by saying a secret phrase, by text or by swiping a button. Extension of mobile safety into wearable devices And, users can connect with people trained to help in unsettling situations over video, which can be an effective deterrent and provide video evidence. We’ve also seen the extension of mobile safety into wearable devices, in order to make these devices more discreet and usable. There will always be some safety risks in our lives. However, the good news is there’s no need to live in a constant state of fear. The easiest, most direct way to be prepared and ready to ‘fight back’ is by having a personal safety tool in your pocket, a mobile safety app that is there, when you need it most.

Delta Scientific’s Vehicle Barriers Elevate Public Safety In Troubled Times
Delta Scientific’s Vehicle Barriers Elevate Public Safety In Troubled Times

Vehicle barriers first rose to the forefront of public attention after 9/11. The focus from 2001 to 2010 was on anti-terrorism, and vehicle barriers appeared at military and government facilities around the world. The U.S. Capitol breach on Jan. 6, 2021, brought heightened attention to the risks in a society that is increasingly fractured and volatile. Various protest events in recent months have made customers more aware of possible threats and prompted many to proactively install vehicle barriers and other systems to protect their premises. Shifting market focus Since 2010, and with the anti-terrorism market mostly saturated, the market focus for vehicle barriers shifted to public safety applications such as stadiums, schools, universities, large tech companies, and data centers. It’s an example of deploying technology developed in “wartime” to the broader public good, says Keith Bobrosky, the new president of vehicle barrier company Delta Scientific Corporation. Withstanding the pandemic The only remaining hurdle for Delta Scientific is to deal with continuing uncertainty going forward Like many in the security market, Delta Scientific has withstood a tumultuous two years during the duration of the novel coronavirus pandemic. They have “come through with flying colors,” says Bobrosky. The company never closed down, and its vaccination rate is high. The only remaining hurdle is to deal with continuing uncertainty going forward. Delta Scientific’s commitment Bobrosky began working in sales at Delta Scientific in 2007. Along the way, he has expanded into management, production, and engineering management. Through it all, he has seen a company that provides employees the autonomy to do their jobs and who have a strong commitment to customers, he says. The privately-owned company is nimble; decisions can be made quickly to respond to market changes, adds Bobrosky. Addressing needs during a pandemic The company was concerned about lower demand when the economy shut down, says Bobrosky, but they did not see an impact. The business was steady as a result of government entities and other organizations taking advantage of being closed to evaluate and address security needs. “We saw a decent flow of government business because of the shutdown,” says Bobrosky. Delta Scientific focuses on the domestic U.S. market but also has a presence selling to partners in the Middle East and Europe, where the equipment is known for its ability to take multiple hits. Even after withstanding an impact according to ASTM standards, their barrier is still operational. Increased steel purchased Delta Scientific ramped up its purchasing power, staving off any shortages and striving to keep lead times short As material shortages have spread through the industry, Delta Scientific has ramped up its purchasing power, staving off any shortages and striving to keep lead times short. Steel is their major component – literally, 98% of the weight of the products is steel, and there are 5,000 pounds of steel per barrier. The price of steel has gone up and there have been shortages. The company has maintained supply by leveraging its reputation and purchasing power. Most of their components are made in the USA, which has helped them dodge the recent challenges of the global supply chain.  Application of barriers and bollards Automotive dealerships are another market for Delta Scientific; their bollards and barriers are used as anti-theft devices to keep vehicles from being stolen from a sales lot. Delta Scientific’s products can foil car thieves who might otherwise use a large vehicle to plow through a barrier and then enable a parade of accomplices to drive away in additional vehicles. Auto resellers buy anti-terrorism products to protect their inventories. DSC550 Open Frame vehicle barrier Delta Scientific’s products have evolved from push buttons and relay to touch screens and microprocessors New efficient product designs enable Delta Scientific to use less steel while keeping prices competitive and maintaining crash ratings. The products are more innovative, says Bobrosky. New barriers include the DSC550 Open Frame vehicle barrier, which does not block the view as solid barriers do. During the last decade control systems for Delta Scientific’s products have evolved from push buttons and relays to touch screens and microprocessors, although some customers still prefer the simplicity of the older approach. Portable crash barriers The equipment can also be controlled remotely and integrated with PSIM-type systems. Although the systems are stand-alone, some clients have been toying with the idea of controlling them through the internet, emphasizing the importance of appropriate cybersecurity. A separate line of portable crash barriers can be towed into place in 15 minutes by a vehicle or even a golf cart. They are used for events such as the Democratic and Republican National Conventions, the Oscars, music festivals, etc. There are hundreds of units in the field, available as needed for various events and rented out to event management companies and other organizers. Improving customer relations  As the president of Delta Scientific, Bobrosky says his biggest opportunity is to continue improving customer relations – a never-ending goal. He will also strive to increase communication. Looking ahead, additional crash tests are scheduled for 2022, and the company will continue to look for ways to “do more with less.”

Access Control Vs. Traditional Locks: Which Is Better & How?
Access Control Vs. Traditional Locks: Which Is Better & How?

The concept of security has substantially upgraded because of technological advancements. We have seen a shift from mechanical locks to electronic locks and door access control systems which are more relied upon nowadays for watertight security and safety. But, choosing the system that is the best for you requires understanding how both these technologies work. In this article, you will get a clear idea of: How electronic locks are better than traditional locks The difference between access control systems and new locking mechanisms Why biometric technology is the best access control system What are traditional locks? These are mechanical locks having strong metal deadbolts, knob locks, levers, etc. They always require a matching physical key. Mechanical locks are easy to install and can protect houses and small offices. However, their keys can be copied easily. Anyone with a key can open a mechanical lock, no matter if it isn’t the owner. Insight: The only advantage of mechanical locks is they’re very modestly priced, so if your security requirements aren’t very complex, mechanical locks can serve you well. The new-age electronic locks Electronic or digital door locks give you increased control over who can enter your premises, extending greater security and accessibility. They are operated using cards or biometrics. Cards cannot be copied without the owner or the manufacturer’s knowledge. Some smart digital locks also provide information on who accessed your door and when, and any attempts of forced entry.  Insight: Although more costly than traditional locks, electronic locks are a better option and investment. What is access control? Access control is a comprehensive system of security that covers all the doors or access points of your premises, only allows entry to people who are registered in the system, exercises surveillance in terms of IDing each user requesting access, and maintains detailed records of all transactions done on the system. The elements required for installing and operating an access control system are: The access reader – This is installed on or beside the door or the access point, is connected to the electric lock, and acts upon the instructions programmed into it by the administrator. The access key – An RFID reader uses an RFID card key, and a biometric reader uses a biometric identifier (fingerprint, palmprint, etc.). The control panel – This stores all the information of the access keys, employees, visitors, etc. and reads commands from the key and sends it to the reader. Electronic lock – The access control door locks are controlled by the control panel. Access control systems go beyond electronic locks as they bring your entire premises under one security framework for convenient monitoring. Why Biometric Access Control Systems Are The Best Bet Biometrics – the science of evaluating features of the human body to establish your identity. Biometric technology has been earning immense approval all over the world in the last two decades. From quick access to managing records of visitors, biometrics does it all, making it the best access control system in use.  As a general practice, companies looking to install biometric security solutions should consider the following points to make their decision easier and more accurate: The purpose for which the system is to be installed. The group of employees who will be using it. The area and scale where it is going to function. Understanding Biometric Access Control Mechanisms According to reports, biometric verification was first encouraged by law enforcement agencies in the 1800s to identify criminals. Later, it was adopted by businesses and large companies for recording the attendance of their employees and maintaining records. Today, technological advancements have developed biometric access control & security systems that can analyze an array of biometric identifiers: Facial Recognition  Fingerprint Recognition Voice Recognition  Iris Recognition Retinal Scans The easiest to install and the most common biometric ACS (access control system) is fingerprint recognition. They’re highly preferred by organizations of all scales and sizes and are easy for employees to operate as well. Next in line is facial recognition, which is slightly expensive due to its equipment and tech, but highly adopted, nevertheless. This has become possible due to facial unlocking systems flooding the smartphone market and making this technology more normalized, plus the onset of the covid-19 pandemic that surged the demands for contactless solutions everywhere.  Insight: For this reason, many biometric access control system manufacturers develop scalable devices that can accommodate multiple identifiers as per the client’s necessities. A unique benefit of the voice recognition component in access control mechanisms is ‘convenience with fun’. We cannot deny the expediency of "Hello Google", "Hey Siri" and "Alexa" in Google Assistant and Apple's voice recognition facilities. Voice recognition is a comparatively costlier access control mechanism and so small companies hesitate to employ it.   Insight: Voice recognition is a developing technology; it can become cost-efficient in the future.   Both iris recognition and retinal scans are ocular-based biometric identification technologies that seem similar but are actually quite different. A retina scan is performed by casting a beam of low-energy infrared light into a person’s eye as they look through a scanner’s eyepiece at close range. Iris scanning uses camera technology to obtain a detail-rich image mapping out the intricate structure of the iris. Overview: Retina scanning is more invasive than iris scanning because the retina is positioned at the back of the eye. Iris scans take a picture of the iris from a distance, whereas retina scanning takes a picture of the iris by putting the person's eye close to the scanner. Insight: Companies looking to install these 2 systems should consider the users as retina scanning works the best for in-person authentication, and iris scanning can be done digitally. How Does Access Control Transcend All Other Locking Systems? The number of benefits that modern access control systems offer is quite evident. They encompass all features of traditional as well as electronic locks and amplify security to a significant level. Moreover, biometric access control raises the bar by eliminating the risks of keys/ proximity cards getting stolen and enforcing identity-based access so that only the one who is authorized can enter.