Secure remote workers by focusing on identity (MFA, Conditional Access), devices (management and compliance), data (DLP, encryption), and access (Zero Trust, not VPN). The perimeter is the user, not the network.
Why Remote Security Is Different
Traditional model: Users in offices, on managed networks, behind firewalls. Security focused on perimeter.
Reality now: Users everywhere—home, coffee shops, airports, co-working spaces. Using various networks you don't control.
The shift: From protecting networks to protecting users, devices, and data wherever they are.
The Security Challenges
Untrusted networks: Home WiFi, public networks, mobile data. You can't trust the network.
Unobserved devices: You can't physically verify what's connected to what.
Personal/corporate blur: Personal devices accessing work data. Work devices used personally.
Expanded attack surface: Every home is now an entry point.
Reduced visibility: Harder to monitor what's happening remotely.
Core Requirements
1. Identity security
MFA everywhere: Every access point, every time. No "trusted network" exceptions.
Conditional Access:
- Block or challenge sign-ins from unusual locations
- Require device compliance
- Apply extra verification for sensitive resources
- Continuous access evaluation
2. Device management
Managed devices:
- Enroll devices in Intune or similar MDM
- Enforce security baselines
- Require encryption
- Control what can be installed
- Enable remote wipe
- Block non-compliant devices from sensitive access
- Require current patches
- Mandate endpoint protection
- Enforce screen lock and PIN
- App-level protection (MAM) if full device management isn't possible
- Container work data on personal devices
- Prevent data leakage to personal apps
3. Secure access
Zero Trust approach: Verify every access request. Don't trust based on network.
Replace VPN where possible:
- VPNs give broad network access once connected
- Cloud applications don't need VPN
- Use identity-based access instead
- Split tunneling (only tunnel what needs it)
- Always-on VPN for corporate devices
- MFA for VPN access
- DNS filtering regardless of location
- Web filtering for threats and policy
- Works on any network
4. Data protection
Encryption:
- Device encryption mandatory (BitLocker, FileVault)
- Data encrypted in transit
- Cloud data encrypted at rest
- Prevent sensitive data leaving approved channels
- Control copy/paste to unmanaged apps
- Block uploads to personal cloud storage
- Sensitivity labels on documents
- Access controls that follow data
- Prevent screenshots/printing of sensitive data
5. Secure collaboration
Approved tools:
- Microsoft Teams, SharePoint, OneDrive
- Controlled external sharing settings
- Guest access policies
- Personal email for work
- Consumer file sharing tools
- Unapproved messaging apps
Quick Implementation
Immediate (Week 1):
- Enforce MFA everywhere
- Enable Conditional Access for basic scenarios
- Require device encryption
- Full device enrollment and compliance
- DNS filtering deployed
- Email security hardened
- Comprehensive Conditional Access policies
- DLP implementation
- Regular security awareness training for remote work risks
Common Mistakes
Trusting VPN alone: VPN without MFA and device compliance is not secure.
Ignoring personal devices: If people use them for work, you need controls.
Office-only security tools: Endpoint protection must work everywhere.
No visibility: You need to know what devices access what data.
Training gaps: Remote workers need specific security training.
What We Provide
Our managed services secure distributed workforces:
- Device management via Intune with security baselines
- Conditional Access configured for Zero Trust
- DNS security that follows users
- Endpoint protection with MDR monitoring
- DLP for data protection
- Security training addressing remote work risks
