cxo voice
  • Business
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • Press Release
    • Submit Press Release
No Result
View All Result
  • Business
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • Press Release
    • Submit Press Release
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home News Cyber Security

Future of Cyber Security in the times of work from home

Sandeep Kamble by Sandeep Kamble
September 10, 2020
A A
Future of Cyber Security in the times of work from home

Image: Sandeep Kamble

Among several things that are now a part of the new normal, work from home has become a prominent one, disrupting the corporate, SME and overall business lifestyle of millions worldwide. Even as the lockdown is being relaxed, the home continues to double up as office space for adults and also virtual classrooms for kids – a norm that looks like is here to stay for a long time. 

Under such circumstances, the significance and security of the shared home WiFi have become vital for organizations and individuals. While India continues to remain the second-largest country to experience maximum cyberattacks in the world over the past few years, the pandemic and the lockdown have further exposed the vulnerabilities in the virtual space for one of the largest population of internet users in the world. 

In this instance, the pandemic has proven to be a huge accelerator for digital transformation across sectors, from business, educations, healthcare, lifestyle and retail. It is now time for a massive cyber security transformation, as companies, economies and countries prepare for a long haul of settling into the new normal, for a considerable time in the near future. 

Some of the key work from home trends related to the virtual security domain that is now going to lead the complete re-invention of cyber security in the near future are: 

1. Mobile appliances

In contrast to the legacy security appliances, traditional cyber security setups were always against a mobile network that generally enhanced the cyber threat risks as users moved out of the protected perimeter. Now, however, as an increasing number of users are going to be accessing work and official information on the go, and will also no longer be concentrated to a single geography, the new cyber security innovations need to create a vast, all-encompassing set up to manage the same. As multiple employees now spread out across the country and access the data from remote locations, innovations in cyber security need to address the mobility factor in the long run. 

2. Dependency on Cloud: 

The security of the cloud has always been debated by traditional cyber security experts with multi-national companies insisting on setting up huge internal servers or data centers to ensure minimum exposure of data on external cloud domains. However, with the use of public domain apps that use general cloud infrastructure, and the increasing use of personal emails or mobile-based apps for convenient conversations among colleagues, cyber security experts will need to devise strategies that can address safer use of cloud technology for a wider set of users.  

ADVERTISEMENT

3. Encrypted cloud connections: 

 Generally, encrypted connections on a closed network server are standard in the case of several the large businesses. However, with the exponential rise in bandwidth demand that businesses move to encrypted cloud connections that offer wider processing ability while managing data security and access to information for a widely spread out set of users. This move can be vital in ensuring a long term, secure network for the work from home structure.

4. Education of employees and constant monitoring: 

While the shift in the technology and security measures for data from the CXO/CISO level would be initiated to do the needful, all effort could be lost if employees are not actively made to participate in new procedures. Given the remote-working format, there is little to almost no control over how, when, and where the device would be used and also if it would be used for non-official purposes. In such cases, timely educational workshops on basic do’s and don’ts for secure work from home routine needs to be conducted. Additionally, a quick set of tips on what to do in case one suspects a data breach also needs to be shared as a ready reckoner with employees so that in case of a crisis, immediate actions can be taken. 

In times of the pandemic, when the world is increasingly learning to depend on digital innovations and the World Wide Web (WWW) has become the hotspot for business and leisure activities, the role of cyber security has become one of the most significant aspects of modern life. Even as IT teams gear up to create solutions, it is now time for cyber security teams to create a safe, and efficient background infrastructure for these innovations to be successful and create the transformation in the post COVID world

Disclaimer: The author of this article is Sandeep Kamble, Founder and CTO, SecureLayer7, Views expresses in the post are his own.


  • Protection of Intellectual Property with Data Loss Prevention
  • Remote Working Made Safer Using Access Gateway
  • Five Safety Tips for Working Remotely

Sandeep Kamble

Sandeep Kamble

Sandeep Kamble, Founder and CTO of SecureLayer7

Related Posts

Google Data Center in Netherlands
Business

Google Unveils New Data Centre in Winschoten, Fueling AI Growth in the Netherlands

November 19, 2025
Microsoft, NVIDIA and Anthropic
Business

Microsoft, NVIDIA and Anthropic Announce Strategic Partnerships to Advance AI Infrastructure

November 19, 2025
Salesforce Acquisition of Informatica
Business

Salesforce Strengthens AI Ambitions with Acquisition of Informatica, Enhancing Data Management and Integration

November 18, 2025
HCLTech and NVIDIA
Technology

HCLTech and NVIDIA Launch Physical AI Innovation Lab in Santa Clara

November 18, 2025
Tech Mahindra and DFKI
Business

Tech Mahindra and DFKI Join Forces to Co-innovate and Co-create Smart Factory Solutions

November 18, 2025
India’s IT Spending
Technology

India’s IT Spending to Cross the $176 Billion Mark in 2026: Gartner Forecasts

November 18, 2025
AI Factory
Technology

GMI Cloud to Launch Next-Gen AI Factory in Taiwan with NVIDIA to Power the Future of AI Infrastructure in Asia

November 17, 2025
Infosys GCC
Business

Infosys Unveils AI-First GCC Model to Revolutionize Global Capability Centers

November 17, 2025
Load More
ADVERTISEMENT

Latest Updates

Google Data Center in Netherlands

Google Unveils New Data Centre in Winschoten, Fueling AI Growth in the Netherlands

by Deepa Sharma
4 hours ago

Microsoft, NVIDIA and Anthropic

Microsoft, NVIDIA and Anthropic Announce Strategic Partnerships to Advance AI Infrastructure

by Deepa Sharma
4 hours ago

Salesforce Acquisition of Informatica

Salesforce Strengthens AI Ambitions with Acquisition of Informatica, Enhancing Data Management and Integration

by Deepa Sharma
16 hours ago

HCLTech and NVIDIA

HCLTech and NVIDIA Launch Physical AI Innovation Lab in Santa Clara

by Deepa Sharma
23 hours ago

Tech Mahindra and DFKI

Tech Mahindra and DFKI Join Forces to Co-innovate and Co-create Smart Factory Solutions

by Deepa Sharma
24 hours ago

India’s IT Spending

India’s IT Spending to Cross the $176 Billion Mark in 2026: Gartner Forecasts

by Arshi Khan
1 day ago

Expert Views

India's Cybersecurity ecosystem
Cyber Security

Inside India’s $20 Billion Cybersecurity Ecosystem: Growth, Challenges, and the Road Ahead

November 11, 2025
From Coaches to Control Rooms: 5 Trends Shaping Railway Smart Video Storage
Opinion

From Coaches to Control Rooms: 5 Trends Shaping Railway Smart Video Storage

November 8, 2025
AI Underwriter
AI

Why AI is the Underwriter’s Strongest Ally

October 30, 2025
agentic AI threats
Cyber Security

Top 10 agentic AI threats, and how to defend against them

October 17, 2025
Your Face, Your Data: The Hidden Risks of Uploading to AI Tools
Cyber Security

Your Face, Your Data: The Hidden Risks of Uploading to AI Tools

October 7, 2025

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Interviews

NewgenONE
Interview

Reimagining Enterprise Transformation: Varun Goswami on the Future of NewgenONE and AI-Driven Automation

-
Jagat Shah, Chairman & CEO of MITSUMI Group
Leaders Talk

Leadership in Emerging Markets: Exclusive Interview with Jagat Shah, Chairman & CEO of MITSUMI Distribution

-
Tokenization
Interview

Revolutionizing Finance: An Exclusive Interview with Sid Ugrankar, Co-founder of Qila.io on the Future of Blockchain and Tokenization

-
Steve Wilson, GenAI Cybersecurity LLMs
Cyber Security

How effective is GenAI in cybersecurity? The role of LLMs and AI in security solutions. [Interview with Steve Wilson]

-

Entrepreneur

Persistent Gender Bias Clouds Perceptions of Leadership in Tech: Study Finds

Top Leadership Skills Entrepreneurs Need in the Age of AI

Samsung Electronics appoints its first female president

Inspiring Women Entrepreneurs in India (2022)

CXOVoice.com is a leading online publication for CXOs, entrepreneurs, senior leaders, developers, and industry professionals. Our coverage spans key sectors, including IT, technology, banking, finance, cybersecurity, engineering, and automobiles.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

[email protected]
  • Home
  • About Us
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

Copyright © 2025 CXOVoice - All Right Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/

No Result
View All Result
  • Home
  • News
  • Business
  • Technology
  • Cyber Security
  • Opinion
  • Leaders Talk

Copyright © 2025 CXOVoice - All Right Reserved