Get Instant Access
to This Blueprint

Security icon

Cybersecurity Priorities in Times of Pandemic

The new remote workforce opens your attack surface. Here’s what to do.

  • Novel coronavirus 2019 (COVID-19) has thrown organizations around the globe into chaos as they attempt to continue operations while keeping employees safe.
  • IT needs to support business continuity – juggling available capacity and ensuring that services are available to end users – without clarity of duration, amid conditions that change daily, on a scale never seen before.
  • Security has never been more important than now. But…where to start? What are the top priorities? How do we support remote work while remaining secure?

Our Advice

Critical Insight

  • There is intense pressure to enable employees to work remotely, as soon as possible. IT is scrambling to enable access, source equipment to stage, and deploy products to employees, many of whom are unfamiliar with working from home.
  • There is either too much security to allow people to be productive or too little security to ensure that the organization remains protected and secure.
  • These events are unprecedented, and no plan currently exists to sufficiently maintain a viable security posture during this interim new normal.

Impact and Result

  • Don’t start from scratch. Leverage your current security framework, processes, and mechanisms but tailor them to accommodate the new way of remote working.
  • Address priority security items related to remote work capability and its implications in a logical sequence. Some security components may not be as time sensitive as others.
  • Remain diligent! Circumstances may have changed, but the importance of security has not. In fact, IT security is likely more important now than ever before.

Cybersecurity Priorities in Times of Pandemic

Start here – read our Cybersecurity Priorities research.

Our recommendations and the accompanying checklist tool will help you quickly get a handle on supporting a remote workforce while maintaining security in your organization.


Member Testimonials

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this blueprint and what our clients have to say.

Client

Experience

Impact

$ Saved

Days Saved

BDO Digital, LLC

Guided Implementation

9/10

$11,156

9

Oregon Youth Authority

Guided Implementation

8/10

N/A

N/A


About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Talk to an Analyst

Our analyst calls are focused on helping our members use the research we produce, and our experts will guide you to successful project completion.

Book an Analyst Call on This Topic

You can start as early as tomorrow morning. Our analysts will explain the process during your first call.

Get Advice From a Subject Matter Expert

Each call will focus on explaining the material and helping you to plan your project, interpret and analyze the results of each project step, and set the direction for your next project step.

Search Code: 92041
Published: March 30, 2020
Last Revised: March 30, 2020

Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019