Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireSecurity Leadership and Management

CISOs are split on whether to favor worker productivity or corporate security with remote-work policies

work life balance and the CISO dilemma
October 20, 2020

A new study conducted among security executives at Fortune 2000 companies captures the CISO perspective on how the “remote work reality” forced by COVID-19 has reshaped organizations’ approaches to corporate security and worker productivity. 

The responses revealed deep and surprising divisions in how differently companies are responding in the face of real business continuity challenges posed by the pandemic. 

For example, 26% of CISOs surveyed have introduced more stringent endpoint security and corporate access measures since the arrival of the pandemic, while 35% have relaxed their security policies in order to foster greater productivity among remote workers; 39% have left their security policies the same, according to the results of the study from Team8 and Hysolate.  

Sixty one percent of respondents felt that they weren’t ready for the changes that the pandemic forced. What remains unclear is whether the other 39% who have made no changes are standing pat because they are comfortable with their company’s security posture or because they don’t know what changes to make and what side to choose - security or productivity.

Here are some other interesting findings:

  • When asked about latitude to browse the Internet freely, 62 percent of respondents said their companies restrict access to certain websites on corporate devices. There are any number of websites that receive large volumes of traffic but that don’t have any relevance to workers doing their jobs. However, challenges arise when companies limit access to websites that workers legitimately need to be able to visit in the course of a typical workday.
  • More than 70 percent of CISOs report not allowing 3rd-party applications to be installed on corporate devices. WhatsApp, Facebook, Slack, Microsoft Teams and Zoom occupy the top slots on the list of applications that employees seek to install. While some may be better suited for personal time, it’s clear that employees are looking for ways to make their days more efficient. And with the shift to remote work further blurring the lines delineating work-life balance, it is understandable that employees want access to the most popular applications and websites on the same devices they primarily use to do their jobs.
  • The new remote-first stance companies have been forced to assume in the wake of COVID-19 has deepened the CISO’s dilemma: Is it more important to structure less stringent security policies to promote worker productivity? Or is it more important to sacrifice user experience in favor of maximizing corporate security? How should they formulate endpoint security and corporate access policies to best address the massive shift to remote work?

The transition to remote-first has produced mixed responses among CISOs:

  • 26% of CISOs surveyed have introduced more stringent endpoint security and corporate access measures since the arrival of the pandemic.
  • 35% have relaxed their security policies in order to foster greater productivity among remote workers.
  • 39% have left their security policies the same.  

In addition, the report found that there is no single standard methodology for enabling remote work on non-corporate and personal endpoints:

  • 4%use zero-trust architecture
  • 13% utilize multi-factor authentication
  • 24% utilize VPN
  • 36% deploy VDI or DaaS
  • 22% do not allow access to corporate networks or applications from a non-corporate device

It is important to note that even in the current remote-first environment, more than one in five companies do not permit workers to use non-corporate endpoints to connect to company assets.

Some organizations utilize split tunneling -- accessing dissimilar security domains concurrently on the same device -- to reduce the organization’s VPN loads and traffic backhauling. Thirty-nine percent of respondents say their companies do not implement split tunneling. Of the 61 percent that do, two-thirds of CISOs express doubt in the security of a split-tunneling approach.

 

KEYWORDS: CISO CISO leadership cyber security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • desk with coffee, keyboard and notebook

    Sixty-three percent of CISOs predict hybrid or remote work to remain

    See More
  • CISOs say they sacrificed cyber security to get remote work up and running

    85% of CISOs say they sacrificed cybersecurity to enable remote work

    See More
  • cyber remote work

    3 ways to ensure network security with a shift to remote work

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products

Events

View AllSubmit An Event
  • August 7, 2025

    Threats to the Energy Sector: Implications for Corporate and National Security

    ON DEMAND: The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing