6 Ways to Stop the Loss of IT Assets to Remote Workers
… limiting how employees interact with the software while employed. Defining access levels in the beginning will make it easier to remove access permissions when an employee leaves the company,” said Heather Paunet, vice president of product management at Untangle.
4. Trust but verify, and then keep verifying. “Employees who pass initial vetting and background checks may now or in the future face any number of situations that entice them to break that trust: pressure through intimidation; being passed over for promotion; extortion or blackmail; offers of large amounts of money; or simply a change in personal conditions. Organizations reliant on existing mechanisms to ensure the trustworthiness of employees and contracted parties with access to sensitive information will find those mechanisms insufficient,” said Steve Durbin, managing director of the London-based Information Security Forum.
5. Consolidate and automate. “Consolidating all IT assets under one system provides a visual of the life cycle of the technology infrastructure, making it easier to track software license and hardware device regardless of location. Companies can better identify where there is overlap or new technology needed because there is a clear record of each item,” said Cox. “Complying with software licenses becomes more complicated when IT assets are dispersed because it’s harder to manage warranties and refresh cycles. Automating risk detection can help monitor if the correct licenses are in use and active for all software. This helps cut down on remote workers using unlicensed software on their work devices.”
6. Integrate asset management and IT service management. “The Center for Internet Security (CIS) lists inventory and control of hardware and software assets as the top two recommended basic controls. Automated, centralized IT asset management can fulfill these recommendations. By integrating asset management and IT service management, IT has the foundation it needs to secure data and prevent a breach while managing the entire life cycle of an asset, from onboarding through reclamation,” said Ian Aitchison, senior product director, ITSM at Ivanti.
- Page 1
- Page 2