I would imagine a famous Austinite saying; Alright, Alright, Alright; you got any user or data security?
No….. Not with my new remote workers.
It would be a lot cooler if you did.
The rush to enable remote workers has caused tech stacks to balloon and IT to lose control over the SaaS apps their employees are using. In fact, even before the shift to remote work, the average employee at an SMB business used more than 8 different apps in the course of their day and that number grew quickly as businesses got bigger (Source: Blissfully’s 2019 SaaS Trends). I personally use over 15 different apps to get my work done each day and Wursta is the only company I have worked with that IT has admin visibility into them all.
Many organizations have spent the last few months getting tools and processes in place to enable their employees to work from home while creating a plan to survive in a post Covid-19 economy. Companies have added new applications to enable realtime communications, developed new ways of collaborating, and even changed some basic parts of their business models so they can continue to succeed in this new environment. Employees have gotten creative and figured out ways to adapt to this massive shift by leveraging low-cost Saas apps to help keep up with goals.
What’s the big deal if my company uses lots of Apps?
Saas products are extremely easy to purchase and often have a low cost to get started. As a result, employees will just go out and start a new Saas subscription when they feel they have a tool gap. These subscriptions are rarely reported to IT, often come out of departmental budgets and not IT’s, and usually have no defined admin.
The security challenges created for IT is several-fold; it is impossible to control password strength and access, unsecured apps can be connected to secure systems without IT knowing, and you cannot control user access in the event of a departure. It also becomes difficult to streamline workflows across departments & teams or optimize your tech stack.
Won’t Someone Please Think of the Domain Security?
If this resonates, you are not alone. Most organizations have yet to address the new security vulnerabilities that these changes have created. As we enter the summer months and with most workforces settling into remote work, now is the perfect time pause enablement efforts & take a look at your user and data security to ensure that your organization is protected from data breaches and phishing attacks.
Here are 2 great ways to get started ensuring your users, devices, and data are secure.
Ensuring your users, devices, and data are secure after transitioning to a remote workforce is no small task. Our Collaboration Design engineers can help provide everything you need to enable secure, remote collaboration with G Suite
- Domain Audit to Ensure Proper Security and Compliance
- Admin Guidance for Enabling DLP for Your Organization
- Secure Your Users with G Suite Endpoint Management Enablement
- Google Vault Implementation & Data Retention Policy
- Establish On-boarding and Off-boarding Processes
Concerned about your security posture? Let us help you see where you stand.
2. Netskope & Wursta Fireside Chat: The Impact of Digital Transformation in the Face of Today’s Threats
Digital Transformation & the rapid need for supporting remote workers for digital business processes took every industry by storm. This change has presented new risks, unlike what companies have seen before, and has created the greatest loss of visibility for security, auditing and quality control professionals since the emergence of the Internet.
As companies continue to adopt new technologies like Google Suite, new ways of defending, evaluating, and delivering effective technical control capabilities are required to succeed in what has come to be known as “the new normal.”
Join Nathan Smolenski, Head of Enterprise Security Strategy from Netskope and Peter Hoff, Information Security Officer from Wursta, who will share insights and lessons on the recent impact of the pandemic but also share their points of view about adapting the security programs, architectures, and technologies to embrace security transformation and the cloud.
Date / Time: Aug 6, 2020 01:30 PM in Eastern Time (US and Canada)
I hope you find these resources useful!