Sign in to view more content

Create your free account or sign in to continue your search

Welcome back

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

New to LinkedIn? Join now

or

New to LinkedIn? Join now

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Skip to main content
LinkedIn
  • Top Content
  • People
  • Learning
  • Jobs
  • Games
Join now Sign in
Last updated on Mar 21, 2025
  1. All
  2. Engineering
  3. Network Security

Employees resist network security measures for remote work. How do you handle the conflicts?

Remote work challenges your security protocols? Share your strategies for balancing security and employee satisfaction.

Network Security Network Security

Network Security

+ Follow
Last updated on Mar 21, 2025
  1. All
  2. Engineering
  3. Network Security

Employees resist network security measures for remote work. How do you handle the conflicts?

Remote work challenges your security protocols? Share your strategies for balancing security and employee satisfaction.

Add your perspective
Help others by sharing more (125 characters min.)
4 answers
  • Contributor profile photo
    Contributor profile photo
    Alexia Wong

    Tuition teacher. Earned Community Top Voice Badge in Teaching in '23 and Community Top Voice Badge in Cybersecurity in '24.

    • Report contribution

    To handle the conflicts, you need to first ask them to know why they are resisting the network security measures. This is so that you would know how to overcome their resistance. You need to then explain to them why these measures are necessary. This is so that they would know why they must adhere to these measures. You need to then make sure that you simplify the measures as much as possible if this is too much of a hastle for them. This is so that it wouldn't affect their productivity.

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    Harry Waldron, CPCU

    Associate Consultant @ Voyage Advisory

    • Report contribution

    Security will always grow tighter to MAX levels where possible. Resistance is futile & NON-ISSUE in the real world. Folks have NO CHOICE with operating system enforced with strong unbreakable GPO TECH settings. Often a lack of advance CHG MGT introductions & TRAINING may cause bad 1st impressions. More rarely, security settings may be too tight & fine tuning can help Most workers know to abide by security & privacy policies. SECURITY audit, legal & fiduciary requirements are important business concerns. Still security must be actively promoted RECOMMENDATIONS 1. Advanced CHG MGT 2. Training DOCs 3. Issues response team for CHG 4. Pilot Test CHG & fan out gradually 5. Promote security awareness 6. Each person plays vital role

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    Sahgal Yadav

    Building AdGrid & Less Pay | Revolutionizing Retail Payments | UPI & Fintech Innovation Leader | Ex-Samsung | Helping SMBs Scale with automation SAAS

    • Report contribution

    Handling Employee Resistance to Network Security in Remote Work Security is non-negotiable, but resistance from employees can be a real challenge. Educate, Don’t Enforce: Instead of mandating security protocols, explain the risks of cyber threats and how security protect both the company and employees. User-Friendly Solutions: Implement security tools that are seamless and minimally disruptive, such as single sign-on (SSO) and password managers. Flexible Security Policies: Adapt security policies to be practical for remote work while maintaining essential protections, like VPN access and endpoint encryption. Empower Employees: Involve teams in shaping security policies, giving them a sense of control rather than imposing strict rules.

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    Vivek Sharma

    COO & Co-Founder at Sarv.com, Strategic Planner| Technical Advisor| Market Analyst

    • Report contribution

    Handling employee resistance to remote security measures requires empathy, communication, and smart implementation: Listen First: Understand their concerns—whether it’s about complexity, productivity, or privacy. Communicate the Why: Clearly explain the risks and how security protects both the company and their work. Simplify the Experience: Use user-friendly tools like SSO and adaptive MFA to reduce friction. Offer Training and Support: Provide hands-on guidance to build confidence and reduce frustration. Involve Them Early: Include employee feedback when rolling out new policies to boost buy-in. Recognize and Reward Compliance: Reinforce positive behavior with encouragement, not just enforcement.

    Like
    2
Network Security Network Security

Network Security

+ Follow

Rate this article

We created this article with the help of AI. What do you think of it?
It’s great It’s not so great

Thanks for your feedback

Your feedback is private. Like or react to bring the conversation to your network.

Tell us more

Report this article

More articles on Network Security

No more previous content
  • Your network security is at risk due to an insecure IoT device. How will you prevent a potential data breach?

    10 contributions

  • Your team is accused of a security breach they didn't cause. How do you prove their innocence?

    14 contributions

  • Struggling to explain network security protocols to non-technical colleagues in a remote work setup?

    14 contributions

  • Employees are bypassing VPN protocols in your company. Are your network security measures enough?

    7 contributions

  • Your remote team relies heavily on VPNs. How can you safeguard against potential vulnerabilities?

    13 contributions

  • You're integrating third-party software into your network. How do you mitigate the security risks?

    6 contributions

  • You need to address a diverse audience on network security. How do you make your presentation effective?

    9 contributions

  • Clients are worried about complex access control measures. How do you ease their concerns?

    7 contributions

  • Ensuring robust security is critical for your network. How do you maintain seamless access?

    2 contributions

  • You're facing pushback from your IT team on network security updates. How can you get them on board?

    9 contributions

No more next content
See all

More relevant reading

  • Technical Support
    How can you keep customer data safe when working remotely?
  • Information Technology
    You're tasked with working remotely in IT. How can you guarantee secure data transmission?
  • Computer Repair
    How can you securely manage remote support requests with sensitive data?
  • Cellular Communications
    How do you optimize cellular communication performance and security in a remote work environment?

Explore Other Skills

  • Programming
  • Web Development
  • Agile Methodologies
  • Machine Learning
  • Software Development
  • Data Engineering
  • Data Analytics
  • Data Science
  • Artificial Intelligence (AI)
  • Cloud Computing

Are you sure you want to delete your contribution?

Are you sure you want to delete your reply?

  • LinkedIn © 2025
  • About
  • Accessibility
  • User Agreement
  • Privacy Policy
  • Your California Privacy Choices
  • Cookie Policy
  • Copyright Policy
  • Brand Policy
  • Guest Controls
  • Community Guidelines
Like
4 Contributions