Keeping Remote Workers Secure After COVID-19
The rapid shift to remote working exposed security gaps in many UK businesses that have since become permanent vulnerabilities. This guide examines the lasting security lessons from the pandemic and the controls needed to secure hybrid and remote workforces in 2025 and beyond.
Matt Cannon
Managing Director
From Emergency Response to Permanent Architecture
In March 2020, UK businesses scrambled to enable remote working under emergency conditions. VPN licences were expanded overnight, personal devices were hastily approved, and video conferencing tools were deployed without security review. Five years later, many of the workarounds adopted in those weeks have calcified into permanent infrastructure.
The security implications are significant. Remote working arrangements implemented as temporary emergency measures often lacked the controls that would have been applied in a planned migration: proper endpoint management, Conditional Access policies, MFA enforcement, data classification and governance controls. For businesses that never returned to full office working, these gaps remain open.
The Threat Landscape for Remote Workers
Remote workers face a different and in some ways more complex threat environment than office-based employees:
- Home network risk: Home routers often run outdated firmware, use default credentials and are shared with family devices — including children's gaming consoles and IoT devices that may be compromised.
- Phishing and social engineering: Remote workers are more isolated from colleagues and may be more susceptible to phishing emails, phone-based vishing attacks and business email compromise. The NCSC has consistently noted elevated phishing activity targeting remote workers.
- Shadow IT: Without IT oversight in the immediate environment, remote workers are more likely to use personal cloud storage, personal email accounts or unapproved collaboration tools to work around inconvenient access controls.
- Insider threat: Remote work reduces visibility of employee behaviour on systems. While the vast majority of employees are trustworthy, the monitoring controls that exist in an office environment are not present at home.
Lessons from the Pandemic Period
VPNs Are Not Sufficient Alone
The pandemic accelerated VPN deployments as the mechanism for remote access to corporate resources. VPNs protect the network tunnel between the device and the corporate network, but they do not validate the security state of the device itself. A compromised personal laptop connecting via VPN can introduce malware into your corporate network.
The Zero Trust model — which assumes no device or user should be trusted by default, regardless of network position — has become the recommended architecture for remote access. Conditional Access policies that verify device compliance, user identity and access context before granting access to applications represent a meaningful improvement over legacy VPN-only approaches.
MFA Should Have Been Mandatory From Day One
Many businesses enabled remote access to Microsoft 365 and other cloud applications during the pandemic without enforcing MFA. The result was a substantial increase in account compromises — password spray attacks, credential stuffing and phishing for Microsoft 365 credentials became the dominant attack vector against remote workers in 2020–2022, a pattern that continues today.
MFA is not optional for remote workers. According to Microsoft's data, MFA blocks over 99.9% of account compromise attacks. If your organisation still has remote workers accessing business systems without MFA, this is the single most urgent control to implement.
Endpoint Visibility Was Lost
When employees moved home with corporate or personal devices, many IT teams lost the endpoint visibility they had in the office — the ability to see what software was running, whether patches were applied and whether antivirus definitions were current. Deploying an EDR (Endpoint Detection and Response) agent across all devices accessing corporate systems restores this visibility and provides the threat detection capability that consumer antivirus cannot match.
The Controls That Matter for Permanent Remote Work
For businesses where remote or hybrid working is now the norm rather than the exception, the following controls should be in place:
- MFA enforced on all cloud accounts without exception, including shared accounts and service accounts where technically feasible
- Conditional Access policies requiring device compliance checks before accessing Microsoft 365 or other cloud applications
- EDR deployed on all endpoints accessing corporate systems, including personal devices enrolled via MDM
- Microsoft 365 secure configuration — Secure Score review, mailbox auditing enabled, external sharing controls reviewed, legacy authentication blocked
- Regular security awareness training with phishing simulation — remote workers benefit from more frequent, shorter training sessions rather than annual compliance exercises
- Clear acceptable use and BYOD policies — documented, signed by employees and actively enforced
- Network segmentation at home — guidance for remote workers on setting up a separate network segment for work devices on home routers that support VLANs
Reviewing Your Remote Working Security Posture
The right time to review your remote working security architecture is before an incident drives it. AMVIA works with UK businesses to assess their remote working security posture against the NCSC's guidance and identify the gaps most likely to be exploited. A structured review typically takes half a day and produces a prioritised remediation plan based on your actual risk exposure.
When Did You Last Review Your Remote Working Security?
Many businesses have not formally reviewed their remote working security controls since 2020. A structured assessment identifies the controls you are missing and prioritises remediation by risk.
Frequently Asked Questions
A VPN encrypts the network tunnel between the remote device and your corporate network, but does not validate whether the device itself is secure. Conditional Access policies — which verify device compliance, MFA status and sign-in risk before granting access — provide significantly stronger security for remote access to cloud applications. For most UK businesses, Conditional Access has superseded VPN as the primary remote access security mechanism.
Phishing and business email compromise remain the most common attack vectors against remote workers, followed by compromised credentials from data breaches being used to access cloud accounts. MFA enforcement addresses both: even with stolen credentials, MFA prevents unauthorised access. Security awareness training and phishing simulation complement technical controls by improving employee threat recognition. <strong>29% of UK businesses</strong> have experienced at least one remote-related security breach. <em>(Mollearn)</em>
Without endpoint management, you do not. Microsoft Intune and Microsoft Defender for Endpoint provide visibility into device compliance — whether patches are applied, whether EDR is running, whether the device meets minimum security requirements. Conditional Access can be configured to deny access to Microsoft 365 from devices that do not meet your compliance baseline, creating an enforced incentive for compliance.
For roles with access to sensitive data, corporate managed devices provide significantly better security than personal devices and are worth the investment. For occasional remote access to non-sensitive systems, a well-configured BYOD programme with MDM device enrolment, MFA and Conditional Access can be an acceptable alternative. The right answer depends on the sensitivity of data accessed and the volume of remote working.
Microsoft Secure Score is a measurement of your Microsoft 365 security posture, calculated by Microsoft based on which recommended security controls you have enabled across your tenant. It provides a prioritised list of actions to improve security and benchmarks your score against similar organisations. For businesses using Microsoft 365, reviewing and improving your Secure Score is a practical way to identify configuration gaps — AMVIA includes Secure Score review in its Microsoft 365 security assessments.
Related Reading
Home Worker Security | Using Personal IT Equipment Safely
How to manage the security risks of employees using personal devices for work, including BYOD controls.
Phishing Protection for UK Businesses | AMVIA Guide
Technical and training controls to protect remote workers from phishing attacks and business email compromise.
Zero Trust Architecture for UK SMEs | Complete Guide
How Zero Trust security principles improve remote access security beyond traditional VPN-based approaches.