{"id":4730,"date":"2024-02-19T17:10:10","date_gmt":"2024-02-19T22:10:10","guid":{"rendered":"https:\/\/eptura.wpengine.com\/?p=4730"},"modified":"2024-09-10T00:33:29","modified_gmt":"2024-09-10T04:33:29","slug":"security-for-workplace-technology","status":"publish","type":"post","link":"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/","title":{"rendered":"Important security features for workplace technology"},"content":{"rendered":"<p><span data-contrast=\"none\">As your organization embraces remote and hybrid work models, data security becomes more important. In the past, companies benefited from having nearly everyone in the same office, connected to the same systems, making security easier because everything was focused on single locations.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">But as the workforce spreads out, vulnerabilities may increase. For example, it&#8217;s harder to protect sensitive information on personal laptops and in homes or coffee shops where employees may be working on public Wi-Fi, despite company policies. So, as you evaluate new workplace technology, you need to work closely with your information technology (IT) department to ensure it has the<a href=\"https:\/\/eptura.com\/our-platform\/visitor-management-system\/workplace-security\/\"> right security features.<\/a><\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Regulations governing workplace technology<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">In an interconnected world, requirements from far away can have local implications. The Internet has connected the world so intricately that we can hire employees \u2014 and provide services to \u2014 from just about any country in the world, so make sure you&#8217;re in compliance with international regulations governing privacy and security.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><span data-contrast=\"none\">General Data Protection Regulations (GDPR)<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">While you&#8217;re probably aware of European Union (EU) security and data privacy laws, you may not have considered how they impact your <a href=\"https:\/\/eptura.com\/our-platform\/workplace-experience-software\/workplace-management-analytics\/\">workplace technology.<\/a> If you are using applications that collect employee data (such as <\/span><span data-contrast=\"auto\">wearable devices<\/span><span data-contrast=\"none\">), you need to notify employees about what information you plan to collect, how you will use it, and how you will keep any personal information secure. Even if you aren&#8217;t doing business in the EU, this is essential for building a relationship based on mutual trust.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Your IT team might also have to evaluate third-party data processors, including cloud providers, and ensure they comply with GDPR.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><span data-contrast=\"none\">California Consumer Protection Act (CCPA)<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Under the <\/span><span data-contrast=\"auto\">California Consumer Protection Act<\/span><span data-contrast=\"none\">, businesses must disclose any personal information they collect and share. Consumers also have a right to ask businesses to delete their personal information or forbid them from selling it.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">While this likely won&#8217;t impact employee applications, you may need to re-evaluate the type of information you collect from customers and ensure you are properly disclosing it.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><span data-contrast=\"none\">SOC compliance<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">SOC compliance shows your organization&#8217;s information security is high. SOC1 compliance is for companies that hold financial information and SOC2 is for all other companies.\u00a0<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">If your company is a service organization, you&#8217;ll probably have to pass a SOC2 audit to be able to provide services to other companies. What does that include?<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The five principles of SOC2 compliance are:<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Common criteria\/security<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Availability<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Processing integrity<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"none\">Confidentiality<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"none\">Privacy controls<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">Are your systems and information protected? Are they accessible and able to be used for operations? Is your company protecting confidential information? Is your company collecting, using, disclosing, and discarding personal information in a way that aligns with your company&#8217;s objectives?\u00a0<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">It&#8217;s important that your third-party vendors follow these guidelines as well and not just your internal staff.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\"><a href=\"https:\/\/eptura.com\/discover-more\/blog\/choosing-workplace-software\/\">Choosing SOC2 compliant workplace technology<\/a> is a proactive step your company can take to ensure you&#8217;re protecting customer and employee data.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Security features for workplace technology<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">In addition to compliance, you can <a href=\"https:\/\/eptura.com\/our-platform\/visitor-management-system\/workplace-security\/\">look at security<\/a> through the lens of specific features.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Access control management<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Demanding proof that users are who they claim to be and have been authorized to access certain information is a must, regardless of the size of your company.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">A good general rule is to give employees and vendors access only to the data needed for their jobs. You want to leverage the software to empower people, but only ever up to a specific point.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Two-factor authentication<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">In a cloud-based environment, identity is everything. Unfortunately, hackers have become more sophisticated, and mobile applications without proper protections can leave organizations more vulnerable to breaches.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Two-factor and multi-factor authentications are forms of access control that require additional information to access an account. After logging in successfully, you may have to enter a code that is sent to your cell phone within a certain timeframe.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">A mobile-centric zero-trust approach<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">The concept of &#8220;zero trust&#8221; is based on the idea that organizations should always verify before granting access. A<\/span><span data-contrast=\"auto\"> mobile zero-trust approach<\/span><span data-contrast=\"none\"> takes password protection and two-factor authentication a step further by establishing a framework that includes:<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Ensuring<\/span><span data-contrast=\"none\"> every user has a device with the right apps and permissions<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Verifying access, not only by verifying the user but also <\/span><span data-contrast=\"auto\">checking<\/span><span data-contrast=\"none\"> the network type<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Enforcing strict security policies<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"none\">Protecting workplace technology from viruses, malware, and any other potential threats<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">Ensuring your workplace technology is up to date is only the first step to zero-trust security. Look for software and applications that deploy updates automatically, rather than relying on employees to continually make updates.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">You may also need to work with your IT team to update policies for network access. That includes ensuring all employees use secure Wi-Fi while working remotely.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Data encryption at rest<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">The opposite of data in transit, data at rest is just what it sounds like. Rather than being transferred across networks or from a device to storage, data at rest is sitting in storage.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Encrypted data is data locked in a virtual safe that requires a key for entry, so even if a hacker breaks into the vault, the goods will be useless to them without the decryption key.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">We tend to focus on encryption efforts for data in motion: When we enter data and hit send, will someone intercept it along the way? But protecting data at rest is just as important.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Cloud-based software<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Cloud-based networks are easy to access and use for storage, making them great tools for teams that aren&#8217;t all in the same building.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Since you don&#8217;t have to have your own servers, cloud networks allow small operations to have large amounts of storage space that is easily scalable depending on current needs.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Your data is also more secure because servers won&#8217;t be damaged by natural disasters, fires, or someone physically tampering with them.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">If using a cloud-based network, review the provider&#8217;s privacy policies and security measures. To keep your company&#8217;s data secure, make sure remote workers are using a portable Wi-Fi hotspot rather than public Wi-Fi.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Security and the \u201chuman factor\u201d<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">People are often the weak link when it comes to security. Look at your vendor management policies. What platforms and data can your third-party vendors access? When you give them access to additional information or platforms, be sure to change the protocols as needed.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Know who&#8217;s accessing confidential information through company laptops versus personal laptops, including third-party vendors and contract employees or freelancers.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Additionally, make sure employees outside of the IT department understand what constitutes high-risk behavior, such as weak passwords and sharing logins and passwords among multiple users. Don&#8217;t assume it&#8217;s &#8220;common sense.&#8221; For example, you might think everyone already knows how the classic gift card scam works, but how can you explain why lots of people still manage to fall victim to it?<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">In the end, organizations need to increase flexibility and accessibility while also maintaining security. It\u2019s a process that requires support from the whole team and across departments. By ensuring compliance with regulations and standards and focusing on security features that protect your data, you can support new work models while still staying safe.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:-20,&quot;335559737&quot;:-20}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As your organization embraces remote and hybrid work models, data security becomes more important. <\/p>\n","protected":false},"author":26,"featured_media":4731,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":"","_wpscp_schedule_draft_date":"","_wpscp_schedule_republish_date":"","_wpscppro_advance_schedule":false,"_wpscppro_advance_schedule_date":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[7,1,286],"tags":[31],"class_list":["post-4730","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-eptura","category-worktech","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v26.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Important security features for workplace technology | Eptura<\/title>\n<meta name=\"description\" content=\"As your organization embraces remote and hybrid work models, data security becomes more important.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Important security features for workplace technology\" \/>\n<meta property=\"og:description\" content=\"As your organization embraces remote and hybrid work models, data security becomes more important.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/\" \/>\n<meta property=\"og:site_name\" content=\"Eptura\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EpturaWork\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-19T22:10:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-10T04:33:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eptura.com\/wp-content\/uploads\/2024\/02\/workplace-security.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"511\" \/>\n\t<meta property=\"og:image:height\" content=\"518\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Jonathan Davis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@epturawork\" \/>\n<meta name=\"twitter:site\" content=\"@epturawork\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jonathan Davis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/\"},\"author\":{\"name\":\"Jonathan Davis\",\"@id\":\"https:\/\/eptura.com\/#\/schema\/person\/2e140d3d2f77b87152b5e2ba941b9158\"},\"headline\":\"Important security features for workplace technology\",\"datePublished\":\"2024-02-19T22:10:10+00:00\",\"dateModified\":\"2024-09-10T04:33:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/\"},\"wordCount\":1204,\"publisher\":{\"@id\":\"https:\/\/eptura.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eptura.com\/wp-content\/uploads\/2024\/02\/workplace-security.webp\",\"keywords\":[\"security\"],\"articleSection\":[\"Blog\",\"Eptura\",\"Worktech\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/\",\"url\":\"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/\",\"name\":\"Important security features for workplace technology | Eptura\",\"isPartOf\":{\"@id\":\"https:\/\/eptura.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eptura.com\/wp-content\/uploads\/2024\/02\/workplace-security.webp\",\"datePublished\":\"2024-02-19T22:10:10+00:00\",\"dateModified\":\"2024-09-10T04:33:29+00:00\",\"description\":\"As your organization embraces remote and hybrid work models, data security becomes more important.\",\"breadcrumb\":{\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/#primaryimage\",\"url\":\"https:\/\/eptura.com\/wp-content\/uploads\/2024\/02\/workplace-security.webp\",\"contentUrl\":\"https:\/\/eptura.com\/wp-content\/uploads\/2024\/02\/workplace-security.webp\",\"width\":511,\"height\":518},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/eptura.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Important security features for workplace technology\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/eptura.com\/#website\",\"url\":\"https:\/\/eptura.com\/\",\"name\":\"Eptura\",\"description\":\"Work your world\",\"publisher\":{\"@id\":\"https:\/\/eptura.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/eptura.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/eptura.com\/#organization\",\"name\":\"Eptura\",\"url\":\"https:\/\/eptura.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eptura.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/eptura.com\/wp-content\/uploads\/2024\/03\/eptura-dark-svg-TM-8.png\",\"contentUrl\":\"https:\/\/eptura.com\/wp-content\/uploads\/2024\/03\/eptura-dark-svg-TM-8.png\",\"width\":1280,\"height\":800,\"caption\":\"Eptura\"},\"image\":{\"@id\":\"https:\/\/eptura.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/EpturaWork\/\",\"https:\/\/x.com\/epturawork\",\"https:\/\/www.linkedin.com\/company\/eptura\/\",\"https:\/\/twitter.com\/epturawork\",\"https:\/\/www.youtube.com\/channel\/UC6hdVbsn41BZxfIYmPUdCWQ\"],\"description\":\"A global worktech company that provides software solutions for workplaces, people, and assets that enable everyone to reach their full potential.\",\"legalName\":\"Eptura\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/eptura.com\/#\/schema\/person\/2e140d3d2f77b87152b5e2ba941b9158\",\"name\":\"Jonathan Davis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eptura.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/eptura.com\/wp-content\/uploads\/2024\/02\/jonathan_davis-96x96.png\",\"contentUrl\":\"https:\/\/eptura.com\/wp-content\/uploads\/2024\/02\/jonathan_davis-96x96.png\",\"caption\":\"Jonathan Davis\"},\"description\":\"As a content creator at Eptura, Jonathan Davis covers asset management, maintenance software, and SaaS solutions, delivering thought leadership with actionable insights across industries such as fleet, manufacturing, healthcare, and hospitality. Jonathan\u2019s writing focuses on topics to help enterprises optimize their operations, including building lifecycle management, digital twins, BIM for facility management, and preventive and predictive maintenance strategies. With a master's degree in journalism and a diverse background that includes writing textbooks, editing video game dialogue, and teaching English as a foreign language, Jonathan brings a versatile perspective to his content creation.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/jonathan-t-davis\/\"],\"jobTitle\":\"Senior Content Writer\",\"worksFor\":\"Eptura\",\"url\":\"https:\/\/eptura.com\/discover-more\/blog\/author\/jonathan-davis\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Important security features for workplace technology | Eptura","description":"As your organization embraces remote and hybrid work models, data security becomes more important.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/","og_locale":"en_US","og_type":"article","og_title":"Important security features for workplace technology","og_description":"As your organization embraces remote and hybrid work models, data security becomes more important.","og_url":"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/","og_site_name":"Eptura","article_publisher":"https:\/\/www.facebook.com\/EpturaWork\/","article_published_time":"2024-02-19T22:10:10+00:00","article_modified_time":"2024-09-10T04:33:29+00:00","og_image":[{"width":511,"height":518,"url":"https:\/\/eptura.com\/wp-content\/uploads\/2024\/02\/workplace-security.webp","type":"image\/webp"}],"author":"Jonathan Davis","twitter_card":"summary_large_image","twitter_creator":"@epturawork","twitter_site":"@epturawork","twitter_misc":{"Written by":"Jonathan Davis","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/#article","isPartOf":{"@id":"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/"},"author":{"name":"Jonathan Davis","@id":"https:\/\/eptura.com\/#\/schema\/person\/2e140d3d2f77b87152b5e2ba941b9158"},"headline":"Important security features for workplace technology","datePublished":"2024-02-19T22:10:10+00:00","dateModified":"2024-09-10T04:33:29+00:00","mainEntityOfPage":{"@id":"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/"},"wordCount":1204,"publisher":{"@id":"https:\/\/eptura.com\/#organization"},"image":{"@id":"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/eptura.com\/wp-content\/uploads\/2024\/02\/workplace-security.webp","keywords":["security"],"articleSection":["Blog","Eptura","Worktech"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/","url":"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/","name":"Important security features for workplace technology | Eptura","isPartOf":{"@id":"https:\/\/eptura.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/#primaryimage"},"image":{"@id":"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/eptura.com\/wp-content\/uploads\/2024\/02\/workplace-security.webp","datePublished":"2024-02-19T22:10:10+00:00","dateModified":"2024-09-10T04:33:29+00:00","description":"As your organization embraces remote and hybrid work models, data security becomes more important.","breadcrumb":{"@id":"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/#primaryimage","url":"https:\/\/eptura.com\/wp-content\/uploads\/2024\/02\/workplace-security.webp","contentUrl":"https:\/\/eptura.com\/wp-content\/uploads\/2024\/02\/workplace-security.webp","width":511,"height":518},{"@type":"BreadcrumbList","@id":"https:\/\/eptura.com\/discover-more\/blog\/security-for-workplace-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/eptura.com\/"},{"@type":"ListItem","position":2,"name":"Important security features for workplace technology"}]},{"@type":"WebSite","@id":"https:\/\/eptura.com\/#website","url":"https:\/\/eptura.com\/","name":"Eptura","description":"Work your world","publisher":{"@id":"https:\/\/eptura.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eptura.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eptura.com\/#organization","name":"Eptura","url":"https:\/\/eptura.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eptura.com\/#\/schema\/logo\/image\/","url":"https:\/\/eptura.com\/wp-content\/uploads\/2024\/03\/eptura-dark-svg-TM-8.png","contentUrl":"https:\/\/eptura.com\/wp-content\/uploads\/2024\/03\/eptura-dark-svg-TM-8.png","width":1280,"height":800,"caption":"Eptura"},"image":{"@id":"https:\/\/eptura.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EpturaWork\/","https:\/\/x.com\/epturawork","https:\/\/www.linkedin.com\/company\/eptura\/","https:\/\/twitter.com\/epturawork","https:\/\/www.youtube.com\/channel\/UC6hdVbsn41BZxfIYmPUdCWQ"],"description":"A global worktech company that provides software solutions for workplaces, people, and assets that enable everyone to reach their full potential.","legalName":"Eptura"},{"@type":"Person","@id":"https:\/\/eptura.com\/#\/schema\/person\/2e140d3d2f77b87152b5e2ba941b9158","name":"Jonathan Davis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eptura.com\/#\/schema\/person\/image\/","url":"https:\/\/eptura.com\/wp-content\/uploads\/2024\/02\/jonathan_davis-96x96.png","contentUrl":"https:\/\/eptura.com\/wp-content\/uploads\/2024\/02\/jonathan_davis-96x96.png","caption":"Jonathan Davis"},"description":"As a content creator at Eptura, Jonathan Davis covers asset management, maintenance software, and SaaS solutions, delivering thought leadership with actionable insights across industries such as fleet, manufacturing, healthcare, and hospitality. Jonathan\u2019s writing focuses on topics to help enterprises optimize their operations, including building lifecycle management, digital twins, BIM for facility management, and preventive and predictive maintenance strategies. With a master's degree in journalism and a diverse background that includes writing textbooks, editing video game dialogue, and teaching English as a foreign language, Jonathan brings a versatile perspective to his content creation.","sameAs":["https:\/\/www.linkedin.com\/in\/jonathan-t-davis\/"],"jobTitle":"Senior Content Writer","worksFor":"Eptura","url":"https:\/\/eptura.com\/discover-more\/blog\/author\/jonathan-davis\/"}]}},"_links":{"self":[{"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/posts\/4730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/comments?post=4730"}],"version-history":[{"count":0,"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/posts\/4730\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/media\/4731"}],"wp:attachment":[{"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/media?parent=4730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/categories?post=4730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/tags?post=4730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}