Independence Day 2020: Declaring Independence from Office-Only IT
Independence Day 2020 comes four months into a pandemic that forced businesses to declare independence from office-only operations.
March 2020 shattered the assumption that work happens in offices. Four months later, it's clear remote work isn't temporary. Let's talk about what declaring independence from office-based IT actually means.
The Old Model Is Gone
Pre-COVID IT assumptions:
- Work happens in the office on company computers
- Network security relies on office firewall
- Data lives on local servers in the building
- IT support means walking to someone's desk
- Collaboration happens in conference rooms
Those assumptions are obsolete for many practices now operating partially or fully remote.
The New Normal Requires Different Infrastructure
Cloud Over On-Premise
Practices dependent on on-premise servers struggled in March. Remote desktop connections to office computers are clunky.
Cloud-first practices adapted smoothly. Email, files, applications already accessible from anywhere.
Remote work accelerated cloud migration by years. Why struggle with VPN when cloud services work from anywhere?
Endpoint Security Over Network Security
Traditional security focused on network perimeter. Strong firewall at the office, everything inside trusted.
Remote work makes perimeter security insufficient. Endpoints (laptops, phones, tablets) connect from home networks, coffee shops, anywhere.
Security must protect endpoints regardless of network location. Antivirus, disk encryption, endpoint detection, device management.
Identity Over Location
Old model: if you're on the office network, you're probably authorized.
New model: verify identity regardless of location. Multi-factor authentication becomes essential, not optional.
Bandwidth As Infrastructure
Office internet was shared infrastructure everyone relied on. At home, every employee has their own internet connection of varying quality.
Home internet quality affects productivity. Practices need to help staff assess and upgrade home internet when necessary.
Security for Distributed Teams
VPN for Network Access
Virtual Private Networks encrypt traffic between remote devices and office resources. Essential for accessing on-premise systems remotely.
But VPN capacity becomes critical. Systems sized for 3 occasional remote users fail with 15 simultaneous connections.
Zero Trust Approach
Don't trust based on network location. Verify every access attempt based on identity, device health, and context.
This works better for distributed teams than perimeter-based security.
Endpoint Protection
Every device needs:
- Current antivirus and anti-malware
- Disk encryption
- Firewall enabled
- Automatic security updates
- Remote wipe capability for lost/stolen devices
Security Awareness for Remote Threats
Remote workers face different threats than office workers:
- Home network security weaknesses
- Family members with access to work devices
- Phishing emails exploiting remote work and COVID themes
- Video conferencing security (Zoom bombing)
Training needs to address remote-specific risks.
Collaboration Without Conference Rooms
Video Conferencing
Zoom, Teams, Webex. Video went from occasional tool to daily infrastructure.
But video needs security configuration:
- Passwords for meetings
- Waiting rooms for external participants
- Host controls over who can share screens
- Understanding what's HIPAA-compliant vs. not
Chat and Messaging
Slack, Teams, other chat platforms replaced "walk over to someone's desk" communication.
But chat creates new data retention and security considerations. Chat history lives somewhere, potentially forever.
File Sharing
Sharing files when everyone's remote requires cloud solutions. OneDrive, SharePoint, Dropbox, Box.
Security controls matter: who can access, share externally, download to personal devices.
Support Without Physical Access
Remote Support Tools
IT support shifted from primarily on-site to primarily remote. Remote desktop tools, screen sharing, remote management.
This is often more efficient than driving to offices, but requires different tools and processes.
Documentation Becomes Critical
When you can't just show someone in person, documented procedures become essential.
"How do I access X?" questions need written answers with screenshots.
Self-Service Resources
Knowledge bases, video tutorials, FAQ documents. Empowering users to solve simple problems without support tickets.
Work-Life Boundary Challenges
Always-On Expectations
When work happens at home, boundaries between work time and personal time blur. This creates burnout risks.
Clear policies about availability expectations help. Not everyone needs to respond to emails at 9pm.
Physical Security at Home
Work devices in homes create physical security concerns:
- Family members with access to devices
- Devices left unattended in public spaces
- Higher theft risk than secured offices
Screen locks, encryption, and awareness training matter more.
What's Permanent vs. Temporary
Four months into remote work, patterns are emerging:
Likely Permanent
- Cloud adoption accelerating
- Video conferencing as standard tool
- Remote support as default
- Hybrid work with mix of office and remote
- Endpoint security priority
Possibly Temporary
- 100% remote for all staff
- Complete elimination of office space
- Relaxed security policies from March chaos
Needs to Change
- March emergency measures need sustainable long-term solutions
- Hasty remote access setups need proper security
- Informal policies need documentation
Declaring IT Independence
Independence Day 2020 is appropriate time to declare independence from office-only IT assumptions:
- Independent from assuming work happens in buildings
- Independent from perimeter-only security
- Independent from on-premise-only infrastructure
- Independent from location-based trust
But independence requires new approaches:
- Cloud-first infrastructure
- Endpoint-focused security
- Identity-based access control
- Remote-capable support
- Distributed team collaboration tools
Moving Forward
Remote work that started as emergency response needs to become sustainable long-term approach.
This means:
- Proper security architecture, not just emergency VPN
- Documented policies, not informal arrangements
- Tested backup and disaster recovery for remote scenarios
- Training for remote work security and productivity
- Investment in tools that support distributed teams
If you need help transitioning from emergency remote work to sustainable remote-capable infrastructure, we can help. We've been working with Arizona practices through the pandemic transition and understand both the technical and practical challenges.
This Independence Day, declare independence from office-only IT. Build infrastructure that works regardless of where people are located. That's the future, whether pandemic or not.