Balance employee privacy and security for remote workers


Cybercrime, Fraud Management & Cybercrime, Governance & Risk Management

Heidi Shey of Forrester on taking a two-pronged approach

Anna Delaney (annamadeline) •
January 8, 2022

Heidi Shey, Senior Analyst, Forrester

The increasingly connected home is a vulnerable part of the extended enterprise, especially as the line between personal life and work blurs further, says Heidi Shey, senior analyst at Forrester. She encourages organizations to take a two-pronged approach to protecting the ‘work-from-home’ workforce: a combination of controlling what they can through Zero Trust and empowering employees to ensure they are there. personal security and privacy.

Shey says organizations need to strengthen the security of corporate devices as well as the apps employees use for work. They should consider app virtualization or app containers, she says, as it offers protection and also makes a device less appealing to criminals.

She also recommends monitoring access control to corporate data resources. “How do you apply any privilege?” How do you look at data access rights and activity, ”she asks.

See also: Case Study: The Road to Zero Confidence

When it comes to empowering employees to protect themselves, Shey says, “It’s about really knowing your staff, their attitudes towards security and privacy, and how willing they may be to do things on their own. same. “

In a video interview with Information Security Media Group, Shey explains:

  • The vulnerabilities and privacy issues that surfaced after nearly two years of working remotely;
  • How organizations can address ‘work from home’ security and privacy concerns by controlling what they can through Zero Trust and allowing employees to protect themselves;
  • How the market for consumer security and privacy technologies is changing.

Shey is a senior analyst at Forrester serving security and risk professionals. His research focuses on data security and privacy strategy, skills development, related technology policies and controls. She guides clients in applying a zero trust, data-centric approach to securing data, advising clients in areas such as sensitive data discovery and classification, data loss prevention and secure communications. . Its research coverage includes the costs of breaches, electronic discovery, cyber insurance, and breach notification and response to clients. It also covers consumer and SME security market trends.


About Author

Comments are closed.