As COVID-19 concerns rise, asset management is vital to secure remote working

A week ago Canadian and U.S. health authorities were saying healthy people could go about their business. Now, they’re urging most businesses to make people work from home.

As a result, a lot of North American organizations in the past seven days or so have made quick decisions letting employees work remotely, including using home computers, computers taken from the office. However, the International Association of IT Asset Managers (IAITAM) fears some employers may have rushed into making their decision without thinking through how to secure their most sensitive data.

“We always say that you can’t manage what you don’t know about,” association president Barbara Rembiesa said in a news release, “and that is going to be a truth with nightmare consequences for many companies and government agencies struggling to respond to the coronavirus situation.  The impulse to send employees home to work is understandable, but companies and agencies without business continuity plans with a strong IT asset management (ITAM) component are going to be sitting ducks for breaches, hacking and data that is out there in the wild beyond the control of the company.”

Related:

BlackBerry, Citrix among firms seeing leap in remote access solution sales

Ideally an organization has a business continuity plan that incorporates IT asset management that can send employees home with laptop or desktop computers (and possibly portable storage) that are accounted for and working properly. But not keeping on top of assets will mean trouble. The association says that without even a basic mobile device management (MDM) system, which scans and blocks devices with vulnerabilities until they are patched, companies will be almost completely blind as to who is accessing their data.

Fortunately MDM and virtual private network (VPN) applications can quickly be subscribed to as a software-as-a-service.

IT leaders in organizations that haven’t yet released staff are being urged to follow these steps:

  1. Sign out and track all IT assets that are being taken home.  No IT assets should be allowed to leave a company site for the first time without formally accounting for each movement;
  2. Make sure solid firewall and passcode protections are in place for accessing company systems.  Companies and agencies that plan properly will “scale up” to accommodate a shift in traffic from the workplace to remote access;
  3. Consider requiring employees to sign a non-disclosure agreement (NDA) about the data they will have access to outside the office.  The data is often significantly more valuable than the IT assets in which it is contained.  Vital company information may be at stake and an NDA sends a message to employees that they have serious responsibilities that must be honored and respected.
  4. Provide education and training to employees about how to responsibly manage their equipment and the company’s data.  For example, parents accustomed to allowing a child or spouse to use a personal smartphone or computer must be coached to avoid doing so with company IT assets.  Companies may also forbid the use of company IT assets on public Wi-Fi networks, such as coffee shops and fast-food restaurants;
  5. Monitor employee data use and other remote practices; 
  6. Tighten the reins on Bring Your Own Device (BYOD) practices.  The longer someone is out of the office, the more likely they will do company business on their personal smartphone, computer, tablet or other BYOD asset. If the employee’s contract or policy language does not give the data rights to the organization the IT asset manager will need to make an addendum giving the rights to the organization. The employee may own the device, but the work-related data is completely owned by the company.

Organizations that have already employees working from home for the first time before asset management could be brought in should consider if these recommendations can be implemented.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Howard Solomon
Howard Solomon
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times. I can be reached at hsolomon [@] soloreporter.com

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now