{"id":42971,"date":"2020-11-30T16:45:03","date_gmt":"2020-11-30T15:45:03","guid":{"rendered":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/?p=42971"},"modified":"2020-12-02T10:42:16","modified_gmt":"2020-12-02T09:42:16","slug":"3-ways-to-create-a-robust-security-strategy-for-remote-teams","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/","title":{"rendered":"3 ways to create a robust security strategy for remote teams"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"attachment-medium size-medium webp-format alignright\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/SUR21_Pro7_Contextual_1333_RGB-300x225.webp\" alt=\"A woman working on a Surface device at home, with security to enable productivity\" width=\"300\" height=\"225\" data-orig-srcset=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/SUR21_Pro7_Contextual_1333_RGB-300x225.jpg 300w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/SUR21_Pro7_Contextual_1333_RGB-1024x768.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/SUR21_Pro7_Contextual_1333_RGB-768x576.jpg 768w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/SUR21_Pro7_Contextual_1333_RGB-1536x1152.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/SUR21_Pro7_Contextual_1333_RGB-2048x1536.jpg 2048w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/SUR21_Pro7_Contextual_1333_RGB-330x248.jpg 330w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/SUR21_Pro7_Contextual_1333_RGB-800x600.jpg 800w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/SUR21_Pro7_Contextual_1333_RGB-400x300.jpg 400w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/SUR21_Pro7_Contextual_1333_RGB-300x225.jpg\" \/>Remote working isn\u2019t new in the business world, but what has been unprecedented is the rise of home working this year. While it wasn\u2019t often by choice, it\u2019s definitely changed the way we work \u2013 in fact, <a href=\"https:\/\/news.microsoft.com\/en-gb\/2020\/09\/08\/for-remote-working-to-be-a-success-the-first-thing-we-need-to-change-is-how-we-think-about-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">72 percent of UK employees and managers report a desire to continue working from home at least part-time<\/a>. Security is an important factor in remote working. For organisations to truly embrace these new ways of working, it\u2019s important to ensure your people have the tools they need to embrace productivity and innovation securely, on devices that let them work in their best way from anywhere.<\/p>\n<p>In the new world of work, it\u2019s important to keep your people at the heart of your business. That\u2019s why empowering them with the tools they need to work smarter will help you create an inclusive and resilient culture. A <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/surface-it-pro-blog\/maximizing-your-roi-from-microsoft-365-enterprise-with-microsoft\/ba-p\/1740437\" target=\"_blank\" rel=\"noopener noreferrer\">Forrester study<\/a> found that workers realised almost two hours in daily productivity gains using Microsoft 365 on Surface, while reducing security breach costs by about 20 percent. We\u2019re going to dive into the ways you can embrace the productivity gains of a robust security strategy, while empowering employees to do their best work from anywhere.<\/p>\n<h2>1.\u00a0\u00a0\u00a0\u00a0\u00a0 Extend security across your entire stack<\/h2>\n<p>A security strategy needs to ensure your entire digital estate is secure. Ensure your entire stack is optimised with devices and applications that have built-in security based on a Zero Trust model. Surface meets the same security standards of all Microsoft software and services, making it a strategic part of your security stack.<\/p>\n<p>But what is Zero Trust? It\u2019s a security model that adapts to the new hybrid workplace and embraces mobility and remote working. By assuming breach, Zero Trust verifies each request or what resource it accesses regardless of where the request originates. By never trusting and always verifying, it ensures every access request is authenticated, authorised and encrypted before granting access.<\/p>\n<p>This identity-based approach works in the background and enables things like single sign-on. Employees can, for example, sign into their Surface device with Windows Hello, a reliable, fully integrated biometric authentication based on facial recognition or fingerprint matching. Because the Surface optimises apps, it makes it easier for employees to work together. In fact, that same <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/surface-it-pro-blog\/maximizing-your-roi-from-microsoft-365-enterprise-with-microsoft\/ba-p\/1740437\" target=\"_blank\" rel=\"noopener noreferrer\">Forrester study<\/a> I mentioned earlier also found that 88 percent of survey respondents said that Microsoft 365-powered Surface devices had helped their employees become more collaborative.<\/p>\n<p>Construction firm <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/820692-willmott-dixon\" target=\"_blank\" rel=\"noopener noreferrer\">Willmott Dixon<\/a> saw an immediate improvement in productivity when using Surface and Microsoft 365. &#8220;A lot of our architects and engineers live quite far away. We now connect with them via Teams&#8221; says Simon Wilson, Senior Operations Manager. &#8220;We&#8217;ve seen projects that have reduced design time from 12 weeks to eight weeks. That is a true saving to the project.&#8221;<\/p>\n<p><a href=\"https:\/\/videos.microsoft.com\/customer-stories\/watch\/TbN1cx9BsCqugj3CvagtF7?\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"attachment-large webp-format alignright\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/willmott-dixon-1024x578.webp\" alt=\"A person standing in front of a computer\" width=\"1024\" height=\"578\" data-orig-srcset=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/willmott-dixon-1024x578.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/willmott-dixon-300x169.jpg 300w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/willmott-dixon-768x433.jpg 768w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/willmott-dixon-330x186.jpg 330w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/willmott-dixon-800x451.jpg 800w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/willmott-dixon-400x226.jpg 400w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/willmott-dixon-235x132.jpg 235w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/willmott-dixon.jpg 1145w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/willmott-dixon-1024x578.jpg\" \/><\/a><\/p>\n<h2>2.\u00a0\u00a0\u00a0\u00a0\u00a0 Manage your security strategy your way<\/h2>\n<p>Zero Trust also helps your IT team manage your security infrastructure by combining threat protection, detection and response. Security can be managed from an easy to use control centre, protecting users, data, and endpoints. An integrated approach takes advantage of AI and automation. They take over low-level risk detection and real-time analytics to monitor and respond. This reduces chronic alert fatigue and means analysts can focus on critical alerts or higher threats.<\/p>\n<p>The built-in security of Surface and Microsoft 365 makes it easy for your IT team to optimise to meet your specific needs. You can even go beyond traditional software-based policy management. Firmware configuration settings can deliver an extra level of hardware control and manageability. For example, the camera can be turned off for any device in highly secure areas to reduce risk. The built-in security of Surface and Microsoft 365 makes it easy for your IT team to optimise to meet your specific needs. You can even go beyond traditional software-based policy management. Firmware configuration settings can deliver an extra level of hardware control and manageability. For example, the camera can be turned off for any device in highly secure areas to reduce risk. Surface also benefits from three security features: <strong>Trusted Platform Module (TPM)<\/strong>, <strong>Unified Extensible Firmware Interface (UEFI)<\/strong> and <strong>Device Firmware Configuration Interface (DFCI)<\/strong>.<\/p>\n<p><strong>TPM: <\/strong>This military-grade security protects the keys used in authentication and encryption.<\/p>\n<p><strong>UEFI:<\/strong> This protects the firmware from malicious attacks. Maintained by Microsoft, so that from the time the power button is pressed to the time that the operating system boots, organisations can avoid a critical vulnerability point and be assured that the latest UEFI updates are pushed out.<\/p>\n<p><strong>DFCI:<\/strong> Born from the Microsoft cloud offerings and enabled fast cloud deployment and management down to the firmware and component level. Benefit for those using AutoPilot via InTune, perfect for cloud first deployment, management and end of user decommission from your IT admin. DFCI gives users freedom to work from any location while still maintaining control and security.<\/p>\n<p>Microsoft Surface Enterprise Management Mode (SEMM) is a feature of Surface devices with Surface UEFI that allows you to secure and manage firmware settings within your organization. With SEMM, IT professionals can prepare configurations of UEFI settings and install them on a Surface device.<\/p>\n<p>While these make it easy for your IT team to manage, a compliant organisation often hears from employees that security measures make it harder for them to access the tools they need to work. When you have built-in security, you can ensure pain-free access without compromising the employee experience. A biometric single sign-on such as Windows Hello can make it faster for your employees to log in. Additions like multi-factor authentication can also reduce credential attacks by 99 percent.<\/p>\n<p>The <a href=\"http:\/\/aka.ms\/dwp\" target=\"_blank\" rel=\"noopener noreferrer\">Department of Work and Pensions (DWP)<\/a> actively serves 25 million British citizens. Their cloud-first strategy allows them to be more agile and efficient. As a result of this approach, they are less reliant on expensive and hard-to-maintain on-premise infrastructure and are able to scale with the demands of business. By pairing this approach with Surface devices, they&#8217;re ensuring advanced security standards are applied from chip to cloud. &#8220;We&#8217;re making sure our solution covers all these security standards without limiting user experience,&#8221; says Nava Ramanan, Workplace Computing Lead Technical Architect at DWP.<\/p>\n<h2>3.\u00a0\u00a0\u00a0\u00a0\u00a0 Minimise risk and reduce costs and complexity<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"attachment-medium size-medium webp-format alignright\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/M365CO20_BusinessVoice_019-300x200.webp\" alt=\"A person on a Teams call on a Surface device. Zero trust security makes it easier to be productive\" width=\"300\" height=\"200\" data-orig-srcset=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/M365CO20_BusinessVoice_019-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/M365CO20_BusinessVoice_019-1024x683.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/M365CO20_BusinessVoice_019-768x512.jpg 768w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/M365CO20_BusinessVoice_019-1536x1024.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/M365CO20_BusinessVoice_019-2048x1365.jpg 2048w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/M365CO20_BusinessVoice_019-330x220.jpg 330w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/M365CO20_BusinessVoice_019-800x533.jpg 800w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/M365CO20_BusinessVoice_019-400x267.jpg 400w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/M365CO20_BusinessVoice_019-300x200.jpg\" \/>With the right tools and devices it is possible to increase security and productivity while reducing costs and complexity. <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/surface-it-pro-blog\/maximizing-your-roi-from-microsoft-365-enterprise-with-microsoft\/ba-p\/1740437\" target=\"_blank\" rel=\"noopener noreferrer\">Surface powered by Microsoft 365 improves enterprise security<\/a> by reducing both the number of security breaches and remediation costs\u2014all without impacting workforce productivity or the employee experience. Forrester found that the number of annual breaches was reduced by 50 percent per year by using two-factor authentication, Advanced Threat Analytics, and Surface Enterprise Management Mode (SEMM).<\/p>\n<p>By integrating new agile methods of device deployment and management, you can improve IT efficiency while reducing overheads. When combining Surface with Microsoft AutoPilot and Windows 10 Pro, IT teams saved four hours per device deployed.<\/p>\n<p>As a local government, <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/820776-warwickshire\" target=\"_blank\" rel=\"noopener noreferrer\">Warwickshire County Council<\/a> is under increasing pressure to make resources go as far as possible while maintaining and improving services for its community. They made the bold decision to reduce costs by going from a combination of eight different devices to just one. They deployed Windows AutoPilot to optimise their IT team and ensure staff could start working straight out of the box.<\/p>\n<p>\u201cIn just three months we migrated 4,500 staff to Microsoft 365 and Surface Pro. And less than one percent of users raised any issue with that at all,\u201d says Craig Cusack, Assistant Director for Enabling Services.<\/p>\n<h2>Keeping workforce productivity at the heart of your security strategy<\/h2>\n<p>When you integrate your devices, apps and cloud security provisions, based on a Zero Trust principle, you can drive a highly orchestrated, centrally managed security solution. This makes it easier for your IT team to manage and deploy. It also embraces productivity and collaboration to ensure your employees stay secure and working at their best, even when remote.<\/p>\n<p>UK law firm Shakespeare Martineau rolled out Surface devices to pair agility and freedom with improved end-point security, flexible productivity and practicality. In the end, it did much more, including improving morale, productivity and reducing downtime. They also saw an increase in billable hours and enhanced client satisfaction.<\/p>\n<p>&#8220;Microsoft Surface complimented our strategy and was the device of choice to support our positive passionate people. The product is very good \u2013 in style, different ways of working and real performance \u2013 and it gives our staff the agility and freedom to work in a way that suits their lives whilst maximizing productivity and effectiveness,&#8221; says Dal Virdi, IT Director.<\/p>\n<p>This also has the advantage of doing more with less. Implement new agile ways of working with a standardised portfolio that optimises the software and apps you run. Not only will this encourage your employees to work better together, but you\u2019ll also benefit from improved efficiency and reduced overheads. That way you can spend more time innovating and delivering a great experience for the customers you support.<\/p>\n<h2>Find out more<\/h2>\n<p><strong>Security and Endpoint Management with Surface:<\/strong> <a href=\"https:\/\/www.microsoft.com\/en-gb\/surface\/business\/security\" target=\"_blank\" rel=\"noopener noreferrer\">Surface for Business<\/a><\/p>\n<p><strong>Visit the website<\/strong>: <a href=\"https:\/\/www.microsoft.com\/en-gb\/business\/reimagine\/security-risk-management\/\">Reimagine security and risk management<\/a><\/p>\n<p><strong>Download the eBook:<\/strong> <a href=\"https:\/\/info.microsoft.com\/ww-landing-a-modern-blueprint-for-endpoint-protection-ebook.html\" target=\"_blank\" rel=\"noopener noreferrer\">Modernise your endpoint security strategy<\/a><\/p>\n<h2>Resources for your development team<\/h2>\n<p><strong>Read the blog:<\/strong> <a href=\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/technetuk\/2020\/10\/20\/data-security-and-encryption-best-practices-for-azure\/\">Data security and encryption best practices<\/a><\/p>\n<h2>About the author<\/h2>\n<div>\n<div data-tid=\"messageBodyContainer\">\n<div data-tid=\"messageBodyContent\">\n<div>\n<div>\n<div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"attachment-thumbnail size-thumbnail webp-format alignright\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Chris-Lorigan-Pic-150x150.webp\" alt=\"Chris, Lorigan a man in a black shirt smiling at the camera.\" width=\"150\" height=\"150\" data-orig-srcset=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Chris-Lorigan-Pic-150x150.jpg 150w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Chris-Lorigan-Pic-300x300.jpg 300w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Chris-Lorigan-Pic-1024x1024.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Chris-Lorigan-Pic-768x768.jpg 768w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Chris-Lorigan-Pic-250x250.jpg 250w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Chris-Lorigan-Pic-330x330.jpg 330w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Chris-Lorigan-Pic-800x800.jpg 800w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Chris-Lorigan-Pic-400x400.jpg 400w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Chris-Lorigan-Pic.jpg 1272w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Chris-Lorigan-Pic-150x150.jpg\" \/>Chris is Surface for Business product portfolio lead for Microsoft in the UK. As the owner of the UK product proposition, Chris enjoys understanding business challenges and bringing together product propositions that empower individuals and businesses to achieve their business objectives. With over 13 years of experience in hardware technology, Chris has held a number of roles in Product Management, Marketing and Sales across the industry in the UK and abroad.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>An integrated security strategy can help organisations truly embrace new ways of working to drive productivity and innovation.<\/p>\n","protected":false},"author":585,"featured_media":43952,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1],"post_tag":[160,804,259,1565,214,1467,328,1305,199,172],"content-type":[],"coauthors":[1541],"class_list":["post-42971","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cross-industry","tag-blogger-series","tag-cyber-security","tag-employee-engagement","tag-endpoint-security","tag-flexible-working","tag-hybrid-workplace","tag-productivity","tag-remote-working","tag-security","tag-surface"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3 ways to create a robust security strategy for remote teams - Microsoft<\/title>\n<meta name=\"description\" content=\"An integrated security strategy can help organisations truly embrace new ways of working to drive productivity and innovation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 ways to create a robust security strategy for remote teams - Microsoft\" \/>\n<meta property=\"og:description\" content=\"An integrated security strategy can help organisations truly embrace new ways of working to drive productivity and innovation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs - United Kingdom\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-30T15:45:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-02T09:42:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Security-Thumbnail-24.11-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chris Lorigan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chris Lorigan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/author\/chris-lorigan\/\",\"@type\":\"Person\",\"@name\":\"Chris Lorigan\"}],\"headline\":\"3 ways to create a robust security strategy for remote teams\",\"datePublished\":\"2020-11-30T15:45:03+00:00\",\"dateModified\":\"2020-12-02T09:42:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/\"},\"wordCount\":1600,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Security-Thumbnail-24.11-1.png\",\"keywords\":[\"Blogger Series\",\"Cyber-security\",\"Employee Engagement\",\"Endpoint Security\",\"Flexible working\",\"Hybrid Workplace\",\"Productivity\",\"Remote Working\",\"Security\",\"Surface\"],\"articleSection\":[\"Cross-industry\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/\",\"name\":\"3 ways to create a robust security strategy for remote teams - Microsoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Security-Thumbnail-24.11-1.png\",\"datePublished\":\"2020-11-30T15:45:03+00:00\",\"dateModified\":\"2020-12-02T09:42:16+00:00\",\"description\":\"An integrated security strategy can help organisations truly embrace new ways of working to drive productivity and innovation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Security-Thumbnail-24.11-1.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Security-Thumbnail-24.11-1.png\",\"width\":800,\"height\":450,\"caption\":\"Create a robust security strategy for remote teams featured blog image.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 ways to create a robust security strategy for remote teams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs - United Kingdom\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs - United Kingdom\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs - United Kingdom\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 ways to create a robust security strategy for remote teams - Microsoft","description":"An integrated security strategy can help organisations truly embrace new ways of working to drive productivity and innovation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/","og_locale":"en_US","og_type":"article","og_title":"3 ways to create a robust security strategy for remote teams - Microsoft","og_description":"An integrated security strategy can help organisations truly embrace new ways of working to drive productivity and innovation.","og_url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/","og_site_name":"Microsoft Industry Blogs - United Kingdom","article_published_time":"2020-11-30T15:45:03+00:00","article_modified_time":"2020-12-02T09:42:16+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Security-Thumbnail-24.11-1.png","type":"image\/png"}],"author":"Chris Lorigan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Chris Lorigan","Est. reading time":"6 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/author\/chris-lorigan\/","@type":"Person","@name":"Chris Lorigan"}],"headline":"3 ways to create a robust security strategy for remote teams","datePublished":"2020-11-30T15:45:03+00:00","dateModified":"2020-12-02T09:42:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/"},"wordCount":1600,"commentCount":0,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Security-Thumbnail-24.11-1.png","keywords":["Blogger Series","Cyber-security","Employee Engagement","Endpoint Security","Flexible working","Hybrid Workplace","Productivity","Remote Working","Security","Surface"],"articleSection":["Cross-industry"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/","name":"3 ways to create a robust security strategy for remote teams - Microsoft","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Security-Thumbnail-24.11-1.png","datePublished":"2020-11-30T15:45:03+00:00","dateModified":"2020-12-02T09:42:16+00:00","description":"An integrated security strategy can help organisations truly embrace new ways of working to drive productivity and innovation.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Security-Thumbnail-24.11-1.png","contentUrl":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/11\/Security-Thumbnail-24.11-1.png","width":800,"height":450,"caption":"Create a robust security strategy for remote teams featured blog image."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/11\/30\/3-ways-to-create-a-robust-security-strategy-for-remote-teams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"3 ways to create a robust security strategy for remote teams"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/","name":"Microsoft Industry Blogs - United Kingdom","description":"","publisher":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization","name":"Microsoft Industry Blogs - United Kingdom","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs - United Kingdom"},"image":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/posts\/42971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/users\/585"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/comments?post=42971"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/posts\/42971\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/media\/43952"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/media?parent=42971"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/categories?post=42971"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=42971"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=42971"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=42971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}