Working From Home: It’s Not All Rainbows and Pajamas

You’re telling me I have a private bathroom, a full kitchen stocked with all my favorite foods, and I can work ALL DAY in my pajamas if I want to!?

What was once a perk offered by only the most hip and trendy organizations is now commonplace in 2020. More people than ever before are working from home.

Today kicks off the start of Home Office Safety and Security Week (Yes, I’d be lying if I said I knew this was a thing before a couple weeks ago).

There are some unofficial observances each year that leave you scratching your head about the practicality and origins (e.g. National Rubber Ducky Day), but in 2020, Home Office Safety and Security Week is as important as it’s ever been.

It’s a good reminder that it’s not all comfy couches and endless snacks when it comes to working from home. Despite the long list of advantages, the home office experience creates a ton of vulnerabilities in one particular way: remote-network connectivity.

The need to access company resources remotely and the prevalence of mobile devices makes locking down your organization’s network an absolutely nightmarish task for the IT team. However, this need for flexibility is a reality of modern business that is not going to change, so the pain points need to be met with new solutions.

While I could preach to you about password safety and antivirus software until the cows come home, the safest and most sustainable approach takes security a step further.

Proactive organizations are implementing Software Defined Perimeter (SDP) technology to lock down their networks. They are choosing to innovate because they acknowledge that traditional solutions like VPNs were not designed for the threats facing today’s hybrid and multi-cloud world.

At DH2i, we recommend taking a look at our tools, DxOdyssey and DxConnect.

This unVPN® software allows you to create highly available, application-level micro-tunnels between any mix of locations on Windows and/or Linux. This enables a massively reduced lateral attack surface by regulating remote-user access at the application level rather than the network level.

In addition, this solution is optimized for multi-platform management ease and unification, and totally removes annoying physical infrastructure requirements.

For a full tour of the software and its capabilities, sign up for a demo. If you have any questions about your organization’s perimeter security approach, feel free to shoot us an email at


Lauren Hawes