IT security in hybrid working models
The future of work is hybrid. Linked to this paradigm shift are numerous new requirements, be it the role of the office or the nature of collaboration. IT departments also face new challenges as a result of the transformation to a hybrid working model. IT and data security will have to be rethought in the future.
What are the information security risks of hybrid working?
For IT security, the shift to mobile work means providing a secure working environment outside the corporate office as well. Both technical and human vulnerabilities need to be taken into account.
Unsecured environments
Remote workers access company data from a wide variety of locations. They regularly switch between well-protected company networks and less well-secured, partly unencrypted home networks or public hotspots. For attackers, such unsecured WLAN networks are usually an easy target to gain access to sensitive data. At the same time, this access makes it impossible for IT departments to identify suspicious activities based on IP addresses and to ward off unauthorised access.
Not protected terminals
In the home office, access is no longer only via the work computer. Instead, employees often use private devices, for example to check chat messages or emails on their smartphone or tablet. However, private devices are usually not under the control of the company. Therefore, there is often no sufficient password protection and regular updates. Other devices logged into the same network also pose a potential threat.
Carelessness of the employees
How can organisations ensure IT security in the hybrid working model?
Modern mobile devices for employees

Allowing employees to work with outdated private technology that is not managed by the company entails high security risks. Instead, all colleagues should work with the latest technology and regularly updated software. This is not only recommended for security reasons, but also guarantees the highest possible productivity. Furthermore, the use of private devices is also problematic from a data protection point of view.
laptops, smartphones & tablets.
Encrypted data transmission
Access management for employees
Another security precaution is the individual assignment of rights for individual users or user roles. With Single Sign On (SSO), access rights can be granted or revoked with little effort. At the same time, the IT department always knows which employee has access to which data. For users, SSO offers the advantage of having access to all relevant applications and services with just one account.
To prevent identity theft, multifactor authentication provides additional security when logging in. By confirming one's identity multiple times, it is ensured that it is actually the person one is claiming to be.
Establish a safety culture
In a hybrid working world, the human factor will play an even more important role in the future with regard to IT security. Companies can reduce avoidable risks through targeted training on the topic of IT & data security, the safe use of end devices and the protection of personal data. This is because regular learning units not only create an awareness of potential dangers, but also provide the workforce with suitable tools to deal with the risks appropriately.
The following measures can already achieve an adequate level of protection in the home office:
- Protect WLAN networks with a password
- Use secure, unique passwords for applications and services
- Carry out regular updates
- Keep documents and equipment inaccessible to unauthorised persons
Maintaining full control with mobile device management
One way to implement many of the above measures is through Mobile Device Management (MDM). This gives IT departments full visibility and control over all devices. After registering the device once in the MDM software, it can then be easily managed, secured and monitored remotely from a central location. It does not matter whether the devices are company-owned or private.
A wide range of functions and configurations can be set up via the console of an MDM software. The features of an MDM solution include, for example:
- Configure network access
- Deployment and updating of apps and applications
- Access management for individual users or roles
- Enforcement of security policies, such as password strength
- Device encryption
- Monitoring
- Inventory & Management
- White- & Blacklisting
- Erasing and locking the machine remotely
- and much more
Mobile Device Management is part of our Device as a Service solution. We are happy to advise and support you in setting up and configuring your individual MDM solution.
Here you can find out more about Device as a Service at Lendis.