IT and Business Insights for SMB Solution Providers

Work from Home: The Art and Science of Post-Perimeter Security: Page 3 of 3

New procedures and policies are required that emphasize identity and access control, while issues around privacy and financial responsibility remain to be addressed. By Colleen Frye
Reader ROI: 
WORK-FROM-HOME users on personal PCs and residential-grade networks have put new stressors on post-perimeter security.
BUSINESSES NEED TO DEVELOP WFH policies and procedures that address secure access, network responsibility, and privacy issues.
INITIAL STEPS include home network scans, installing EDR and anti-virus, and enforcing multifactor authentication.

Going Forward

With WFH potentially the new normal for the foreseeable future, businesses are going to have to take on the responsibility of security beyond the perimeter for the long term. Some options, O’Hara says, would be to identify key personnel and pay for their internet access or implement and pay for a parallel network in the home that is just for corporate use.

Businesses will have to have the same debate about home networks that they had around bring your own device, O’Hara adds. “Do we have to support it? Do they support it? The same question with the network.”

Managed service providers, in the meantime, can start implementing tools and services to perform threat assessments of their customers’ WFH computing environments, O’Hara says.

He notes one caveat: “If the MSP starts poking around on people's [home] networks, there is a liability that if they bring that network down, they're going to have to fix it. There's just no ands, ifs, or buts about that.”

Image: iStock

About the Author

Colleen Frye's picture

Colleen Frye is ChannelPro's managing editor.

ChannelPro SMB Magazine

Get an edge on the competition

With each issue packed full of powerful news, reviews, analysis, and advice targeting IT channel professionals, ChannelPro-SMB will help you cultivate your SMB customers and run your business more profitably.