Guide

Securing Remote Workers

Remote and hybrid work is permanent. Your security architecture must account for employees connecting from home networks, coffee shops, and co-working spaces — not just your office.

FK

Farhad Mirza Khawar

Founder of HIPAA Agent and Cyber Defense Agent. Compliance infrastructure for SMBs. Sacramento, CA.

2026-05-01

VPN vs ZTNA: choosing the right remote access model

Traditional VPN and Zero Trust Network Access (ZTNA) take fundamentally different approaches to remote access. Traditional VPN: A VPN creates an encrypted tunnel between the remote user's device and your corporate network. Once connected, the user typically has broad access to the network — similar to being physically in the office. VPN limitations: - Broad network access: A compromised VPN connection exposes the entire network to the attacker. - Performance: All traffic routes through the VPN concentrator, creating bottlenecks. Split-tunneling helps but introduces security gaps. - Scalability: VPN infrastructure does not scale well for large remote workforces. - Lateral movement: Once inside via VPN, attackers can move laterally across the network. - No device health validation: Traditional VPNs authenticate the user but do not verify device security posture. Zero Trust Network Access (ZTNA): ZTNA grants access to specific applications — not the network. Each access request is evaluated based on user identity, device health, location, and risk signals. ZTNA advantages: - Application-level access: Users connect to specific applications, not the entire network. No lateral movement possible. - Device compliance: ZTNA verifies device health (patched, encrypted, EDR active) before granting access. - Identity-aware: Integrates with your identity provider for conditional access policies. - No network exposure: The internal network is invisible to the remote user. - Cloud-native: Works equally well for cloud and on-premise applications. ZTNA solutions for SMBs: - Microsoft Entra Private Access: Included with certain Microsoft 365 plans. Replaces VPN for Microsoft-centric businesses. - Cloudflare Access: Part of Cloudflare Zero Trust. Free tier available for up to 50 users. - Tailscale: WireGuard-based mesh VPN with zero trust principles. Easy deployment, $5/user/month. - Zscaler Private Access: Enterprise-grade ZTNA. More expensive but comprehensive. Recommendation: For new deployments, choose ZTNA over traditional VPN. For existing VPN deployments, plan a migration to ZTNA over 6-12 months while maintaining VPN as a backup.

Device security for remote workers

Remote devices are outside your physical control. Compensate with technical controls: 1. Mobile Device Management (MDM) Enroll all company-owned and BYOD devices in MDM: - Microsoft Intune (included in Microsoft 365 Business Premium) - Jamf (for Apple devices) - Google Workspace endpoint management MDM policies to enforce: - Full-disk encryption enabled (BitLocker, FileVault) - Screen lock with PIN or biometric authentication - Minimum OS version and patch level - EDR agent installed and active - Automatic updates enabled - Remote wipe capability for lost or stolen devices 2. Conditional access based on device compliance Use conditional access policies that block non-compliant devices from accessing corporate resources. If a device is not encrypted, not patched, or missing EDR, it cannot access email, file shares, or applications until remediated. 3. Endpoint Detection and Response (EDR) Deploy EDR on all remote devices. Remote workers face elevated risk because they connect to untrusted networks and lack physical security controls. EDR provides behavioral threat detection, automated response, and forensic capability regardless of the device's network location. 4. Application controls Restrict which applications can be installed on corporate devices. Use application allowlisting or Microsoft Defender Application Control to prevent unauthorized software installation. This reduces the risk of employees installing compromised or trojanized applications. 5. Data Loss Prevention (DLP) Prevent sensitive data from leaving corporate applications. Microsoft Purview DLP (included in Business Premium) and Google Workspace DLP can block sensitive data from being copied to personal email, cloud storage, or USB drives.

Home network risks and mitigations

Remote workers connect through home networks that you do not control. These networks introduce risks that do not exist in a managed office environment. Common home network risks: 1. Default router credentials — Most home routers ship with default admin passwords (admin/admin, admin/password). An attacker on the local network (or exploiting a remote vulnerability) can take full control of the router, intercept traffic, and redirect DNS queries. 2. Outdated router firmware — Home routers rarely receive firmware updates. Known vulnerabilities in consumer routers are widely exploited by botnets and targeted attackers. 3. Shared networks — Remote workers share their home network with family members, IoT devices (smart speakers, cameras, thermostats), gaming consoles, and potentially compromised personal devices. Any compromised device on the network can attack others. 4. No network segmentation — Home networks are flat. The work laptop, the teenager's gaming PC, the smart TV, and the security camera are all on the same network segment. 5. Public Wi-Fi — Remote workers at coffee shops, airports, and co-working spaces face man-in-the-middle attacks, rogue access points, and network sniffing. Mitigations you can implement: - ZTNA: Eliminates the risk of network-level attacks because users connect to applications, not networks. - Always-on VPN/ZTNA: Ensure all work traffic is encrypted regardless of the network. - DNS security: Deploy DNS filtering (Cisco Umbrella, Cloudflare Gateway, NextDNS) on work devices to block malicious domains regardless of the network. - Device compliance: Conditional access ensures devices meet security standards before connecting. - Employee guidance: Provide remote workers with a home network security checklist: change default router password, enable WPA3, update firmware, enable automatic updates, and use guest networks for IoT devices. - Network isolation recommendation: Recommend that remote workers create a separate Wi-Fi network (SSID) for work devices, isolated from personal and IoT devices. Most modern routers support guest networks or VLAN-like segmentation.

Key Takeaways

TL;DR

ZTNA is more secure than traditional VPN — it grants application-level access, not network-level access.

Enroll all remote devices in MDM and enforce compliance policies: encryption, patching, and EDR.

Use conditional access to block non-compliant devices from accessing corporate resources.

Home networks are untrusted — mitigate with always-on ZTNA, DNS filtering, and device compliance.

Provide remote workers with a home network security checklist: router password, firmware updates, WPA3, and network segmentation.

FAQ

Frequently asked questions

Should we use VPN or ZTNA for remote workers?

ZTNA is recommended over traditional VPN for new deployments. ZTNA provides application-level access (not broad network access), verifies device health before granting access, and eliminates the risk of lateral movement. For SMBs, Cloudflare Access (free for up to 50 users), Tailscale, or Microsoft Entra Private Access are practical options. If you have an existing VPN, plan a gradual migration to ZTNA.

How do we secure BYOD (bring your own device) for remote workers?

For BYOD, enroll personal devices in MDM with a work profile (separate container for corporate data). Use Microsoft Intune MAM (Mobile Application Management) policies that protect corporate data within managed apps without controlling the entire personal device. Require MFA, device encryption, and minimum OS version. Use conditional access to limit BYOD access to less sensitive resources.

Are home networks a security risk for remote workers?

Yes. Home networks typically have default router credentials, outdated firmware, no segmentation, and shared access with personal and IoT devices. Mitigate these risks with always-on ZTNA (so work traffic never traverses the local network unprotected), DNS filtering on work devices, device compliance enforcement, and employee guidance on home network hardening.

Get your Cyber Defense Score™ in 60 seconds.

100 tools. No installation. No credit card. Real evidence.