Intelligent CIO LATAM Issue 31 | Page 47

FEATURE : CYBERSECURITY
Note , by the way , that it ’ s not just employees ’ individual devices that are at risk . Since those devices are connected to the corporate network , attackers can move laterally to compromise other IT assets . A single compromised admin account could place the entire business at risk . Indeed , abuse of Windows privileges is the most common attack vector threat actors leverage to spread ransomware across networks .
A particular risk for remote workers
Not being able to use important tools due to lack of admin privileges , or granting employees more privileges than they should have , is an issue that affects workers of all types , not just those who are remote .
However , it ’ s especially challenging for companies with remote workers for a couple of reasons .

IT ’ S POSSIBLE TO STRIKE A HEALTHY BALANCE

BETWEEN PRODUCTIVITY AND SECURITY . BUT DOING SO REQUIRES BUSINESSES TO DEPLOY TOOLS AND PROCESSES THAT MANY

HAVE NOT TRADITIONALLY HAD IN PLACE .

One is that when employees are not in the office , asking IT staff to install software for them becomes more challenging .
Although it ’ s certainly possible for technicians to connect to employees ’ PCs remotely and install the software they need , coordinating that activity is harder when employees can ’ t simply walk to the help desk to ask for software installation . The fact that remote workers may be in different time zones from the IT team complicates installation further .
The other special challenge is that remote workers often log in via home networks and are not directly connected to the corporate network or domain . As a result , IT staff may not be able to reach their devices easily to perform remote software installation .
Striking a balance
So , what ’ s a business to do ? Does it have to make the hard choice between prioritizing worker productivity www . intelligentcio . com INTELLIGENTCIO LATAM 47