How Cloud-Based Training Can Better Enable Remote Workers

User Review
0 (0 votes)


Cloud Based Training

Cloud Based Training- Remote working has suddenly jumped to the top of the enterprise agenda. While most organizations have the rudiments of basic connectivity, video conferencing and collaboration in place, the next big challenge is to ensure that this workforce remains engaged and trained, and that the now-expanded data ecosystem remains in tune with the company’s overall security culture.

Even for seasoned security experts, this is uncharted waters. With so many employees working from home, on personal devices that most likely do not have the most up-to-date protection, the number of attack vectors into critical data and infrastructure has increased exponentially. It is difficult enough to ensure security in the office. At home, many tend to operate under a different, more lax set of rules.

Wired’s Lily Hay Newman recently spelled out all the ways COVID-19 has set the stage for “hacking mayhem,” and the outlook is not pretty. Not only are distributed denial of service (DDoS) attacks targeting key research facilities like the Czech Republic’s Brno University Hospital, the number of pandemic-related phishing attacks is on the rise as well.

If these attacks start to target home devices, and they probably will, they could wreak tremendous damage on enterprise systems, all while security is working with a skeleton crew on-premises.

This is not meant to sound alarmist, but it does highlight how the threat potential has changed over the past month and that all knowledge workers need to understand the seriousness of the moment.

A key question is how organizations are expected to train their workers on the new security protocol, especially when the protocols themselves are being revised? This is where cloud-based training can be invaluable. The cloud, after all, is designed to suit the needs of a distributed workforce. Not only does it provide massive scalability and global connectivity, its security is specifically designed to accommodate remote users and rivals what you’d find in an enterprise data center.

Read More Here

Article Credit: Info Security