September 27, 2021
The pandemic forced organizations to adapt quickly to a distributed workforce, a shift that resulted in unprecedented challenges to business continuity and productivity.
Cybercriminals decided to shift their tactics as well, targeting remote workers with a wave of phishing scams and breach attempts.
With some major multinational organizations planning to implement working models that incorporate a remote element in varying degrees, it has become apparent that the future of work will be one defined by increased flexibility.
For most organizations, that means a continued effort to secure their networks, with new considerations for securing cloud-based systems and integrated networks.
We asked three IEEE Impact Creators, each a cybersecurity expert, a simple question:
If there was one piece of technology you could implement to improve the security of a remote workforce, what would it be?
Their answers provide a fascinating look at the technologies of the future, and the state of the world today.
Federated Learning: Enterprise security systems rely on artificial intelligence to detect behavioral anomalies and intrusions on a network. When more data is available, the system is better. But sometimes, the various components of a network don’t want to share data for privacy reasons. There is a lot of data on a mobile device, for example, but sharing that information could be detrimental to the owner of the device. Larger organizations might not want to share data with smaller organizations, because the risk of data loss outweighs the security benefits. Federated learning is a decentralized machine learning technology that allows multiple entities (which can include businesses, nodes on a network, or mobile devices) to contribute to a machine learning model without sharing or exchanging data. Federated learning systems can also use blockchain as a means of sharing information.
“More system protection policies and edge intelligence-based calculation modes are vital for data security. Data is always intercepted during transmission from the perceptual side to the service side. The design of edge servers and the development of federated learning can greatly perfect the protection schemes of the infrastructure for daily life.” — IEEE Senior Member Guangjie Han
Better Bring Your Own Device (BYOD) Policies: For a variety of reasons, like personal preference or situational need, people often use their own laptops and their own phones for work. In fact, it’s hard to stop them. But these devices may have less security than their corporate counterparts. The solution is a set of policies that allow systems administrators to selectively wipe application data from an employee-provided device to remove sensitive company information from a personal device. These policies come in handy in the event an employee’s phone is lost or stolen, or if an employee separates from a company.
“I would recommend system administrators use BYOD programs which can let administrators do selective wipes of devices and clean App data without wiping the entire device. Additionally, when a full wipe is needed, the policy can force an SD card wipe along with the internal storage of the device if necessary.” — IEEE Senior Member Kevin Curran
Endpoint data loss prevention: This technology monitors end-point devices (like company smartphones and laptops) to determine when sensitive or high-value data is used or shared. It’s a vital tool to prevent insider thefts of intellectual property.
“As part of the great resignation of 2021, we’ve seen an increasingly fragmented view of intellectual property on the part of departing employees. Businesses can reduce the substantial risk associated with data exfiltration of trade secrets, regulated data and other sensitive data by deploying and monitoring DLP across the enterprise, including remote endpoints.” — IEEE Senior Member Kayne McGladrey
Cybersecurity professionals need to anticipate the attacks of today, and those of tomorrow. This online course covers everything you need to know about the tools that secure today’s online environment.





Meaningful Momentum or Running in Place?
AI Through Our Ages
Liquid Infrastructure: Our Planet's Most Precious Resource
The Impact of Technology in 2025
Quantum and AI: Safeguards or Threats to Cybersecurity?
Why AI Can't Live Without Us
Bits, Bytes, Buildings and Bridges: Digital-Driven Infrastructure
Impact of Technology in 2024
Emerging AI Cybersecurity Challenges and Solutions
The Skies are Unlimited
Smart Cities 2030: How Tech is Reshaping Urbanscapes
Impact of Technology 2023
Cybersecurity for Life-Changing Innovations
Smarter Wearables Healthier Life
The Global Impact of IEEE's 802 Standards
How Millennial Parents are Embracing Health and Wellness Technologies for Their Generation Alpha Kids
Space Exploration, Technology and Our Lives
Global Innovation and the Environment
How Technology, Privacy and Security are Changing Each Other (And Us)
Find us in booth 31506, LVCC South Hall 3 and experience the Technology Moon Walk
Virtual and Mixed Reality
How Robots are Improving our Health
IEEE Experts and the Robots They are Teaching
See how millennial parents around the world see AI impacting the lives of their tech-infused offspring
Take the journey from farm to table and learn how IoT will help us reach the rising demand for food production
Watch technical experts discuss the latest cyber threats
Explore how researchers, teachers, explorers, healthcare and medical professionals use immersive technologies
Follow the timeline to see how Generation AI will be impacted by technology
Learn how your IoT data can be used by experiencing a day in a connected life
Listen to technical experts discuss the biggest security threats today
See how tech has influenced and evolved with the Games
Enter our virtual home to explore the IoT (Internet of Things) technologies
Explore an interactive map showcasing exciting innovations in robotics
Interactively explore A.I. in recent Hollywood movies
Get immersed in technologies that will improve patients' lives