burger menu
Managing the Cyber Risks of Remote Work

Managing the Cyber Risks of Remote Work

    Add to bookmarks
SUMMARY

This report about remote work and cybersecurity by BCG examines seven key aspects to protect businesses against cyber risks over the Covid-19 crisis.

Companies are requesting their employees to work remotely in the wake of the coronavirus outbreak. Organizations, the research notes, have to follow a series of steps to protect their data and IT systems.

To work remotely, employees will be required to use devices that connect to business servers over the internet. To start with, companies need to examine three categories of IT infrastructure to enable remote work: endpoints, connectivity, and enterprise architecture and infrastructure.

Apart from technical considerations, employees should receive training on cybersecurity to reduce risk. The establishment of protocols to get ready for secure remote working is also key. It is also essential to adapt plans for secure, remote crisis management, the report adds. This document concludes that access and security measures should also be updated to make remote work more secure over the coronavirus outbreak.

OUTLINE

Core IT infrastructure and remote working

Apps and devices security

Embed cybersecurity

 

DETAILS

Overview

Researchfinder Rating
5 out of 5 stars
Title
Managing the Cyber Risks of Remote Work
Region
Global
Published
March 20, 2020
Publisher
BCG
Author(s)
Michael Coden, Brett Thorson, Kris Winkler, Karalee Close, Walter Bohmayr
Price
FREE
Language
ENGLISH

Content

Number of Pages
10
Number of Tables
0
Number of Exhibits
1
Topics
business-and-corona, security
Tags
BCG, corona, coronavirus, Covid-19, crisis management, cyber attack, cyber risk, cyber security, global, health, healthcare, home office, remote work, security
Author(s)
Michael Coden, Brett Thorson, Kris Winkler, Karalee Close, Walter Bohmayr
Methodology
Not available.

Similiar Reports

Internet Trends 2019

FREE

2019 Global eCommerce Fraud Management Report

FREE

Good Practices for Security of Internet of Things

FREE