The problem:
Remote work is flexible, but it introduces huge security gaps when employees work from third-party locations — such as coffee shops, airports, hotels, coworking spaces, or at home.
Your remote work policy MUST specifically address public spaces.
The biggest culprits:
- Public Wi-Fi: A major data leak waiting to happen.
- Unsecured File Transfers: Data moves off-network without protection.
- Screen Visibility: “Shoulder surfing” can expose confidential data.
Implement mandatory policies for secure remote connections:
With the advancement and proliferation of AI and other technologies being used by bad actors, traditional remote protection methods, such as traditional VPNs, are no longer adequate.
To stay ahead of the hacker community, it is necessary to implement advanced cloud-based protections including:
- Secure Access Service Edge (SASE). SASE technology establishes an encrypted, always-on secure connection to a cloud network. It replaces the need for a user to manually connect to a traditional VPN, while providing a higher level of security.
- Software-Defined Perimeter (SDP). In lieu of a VPN tunnel, SDP creates an invisible, identity-aware path between users and resources – providing a secure path without broadly exposing networks.
- Zero Trust Network Access (ZTNA). ZTNA verifies identity and device posture before allowing access to specific applications or resources.
Secure File Transfers & Data Sharing
Be sure to maintain clear rules on handling client data and IP in public. Users should utilize company-approved platforms only – such as SharePoint, OneDrive, or Google Drive.
Audit logs should be enabled for file access. Files containing customer or financial data must be encrypted at rest and in transit.
Using personal email for work files should be prohibited. Also, approval policies should be in place for public file-sharing services. Explicit approval should be needed for use of USB drives. Also, laptops and USB drives should be encrypted.
- Issue Guidelines for Screen Visibility
“Shoulder Surfing” is a common vulnerability for remote workers. Avoid working with sensitive data when strangers may be able to see your screen. Privacy screen filters should be used on laptops when in public areas. Devices should never be left unattended – even “for a minute”. Screens should be locked when stepping away, even at home.)
Don’t let remote flexibility become a security nightmare!
Contact us today to discuss how to best secure your remote workers’ computer usage and sensitive data.
Call us at 201-493-1414 or reply to this message for a consultation!
powersolution.com Ranked in Top 250 Global Managed Security Providers.
How is your state of IT? Call Us: (201) 493-1414 with any questions.

