Why is zero trust part of keeping end users secure? It changes the focus away from tools like VPNs to truly securing the endpoints. VPNs can be a crutch, and they can encourage sloppy security habits. Using a combination of tools, including mobile device management solutions and endpoint security suites, IT staff can armor users’ devices and monitor compliance with institutional security policy.
When the VPN is gone, IT and the end user must look harder at how to secure the endpoint, whether that’s a laptop, desktop or mobile device. Centrally managed endpoint security may encounter some resistance from an independent academic community, so IT teams should be ready to defend the need and the value it delivers.
RELATED: Here are 5 VPN myths your end users need to know.
Standardize Tools and Configurations Whenever Possible
One of the challenges IT departments have had to navigate over the past year is balancing users’ individual preferences and the need for standard tools that meet specific security requirements.
The best examples of this are collaboration tools, such as email, chat and videoconferencing. By offering institutionally standardized tools that are already configured with better security, you can protect remote users who make heavier use of collaboration tools than they do when working on campus. Even if you can’t afford a campuswide subscription for some of these tools, you can prepare documentation and quick reference guides to help users secure their personal or free subscriptions.
For standardization, collaboration is the obvious category to start with. File sharing and drive synchronization are instances where a little security
goes a long way.
Security isn’t only about data security, however: Standards for cloud backups and other areas can increase the availability and maintain the integrity of institutional data.