Similar to many organizations, Udemy underwent a complete digital shift with a mandate that all employees work from home during the COVID-19 pandemic. While our technical teams are experienced in empowering a worldwide employee base, transitioning the entire 600+ person global workforce to an at-home workforce required a swift roll-out of processes and best practices for remote work and business continuity.

Here are some of our technical tips to help your employees work successfully in their new remote workspace and ensure business continuity.


With employees working remotely on home networks, cybersecurity is more important than ever for companies of all sizes. Here are some suggested security measures companies should institute now, as well as risks to monitor in the near future. 

1. Implement single sign-on 

Consider implementing a single sign-on (SSO) service for employees to easily and securely access the business apps and services required in their roles. An SSO tool allows employees to use one set of credentials to log in to all the apps and services that they’ve been given access to by the IT team. 

Not only is it convenient for employees to have what otherwise looks like one account on a service like Okta, but it’s also an essential tool in a company’s security toolkit. The IT team has precise control over which services employees use, their permission levels, and can easily change access control when employees join or leave the company.

Risk Management for Cybersecurity and IT Managers

Last Updated June 2020

  • 24 lectures
  • All Levels
4.6 (17,271)

The management’s guide to understanding Risk Management decisions in cybersecurity and information technology (IT) | By Jason Dion • 1.8 Million+ Enrollments Worldwide, Dion Training Solutions • ATO for ITIL & PRINCE2, Dion Training Solutions • ATO for ITIL & PRINCE2

Explore Course

2. Require multi-factor authentication

Part of strong SSO use includes multi-factor authentication (MFA). In addition to a username and password, MFA asks users to input a secondary credential, which can be retrieved from a linked phone app, text message, biometric recognition, or other authentication means. The additional layer of security mitigates the risk of a bad actor penetrating corporate systems with just an email address and password alone.

3. Provide recommendations on home network security

Home network security may not be as advanced as your corporate office. Internet of Things (IoT) devices and misconfigured or outdated network equipment may expose employees and company workstations to threats on home networks. Avoid public Wi-Fi at all costs, but if that’s the only option for an employee, a VPN client should be used. Ensure company workstations and software are up-to-date and local firewalls are enabled. Endpoint threat protection solutions should be enabled on all workstations to alert the Security and IT personnel of endpoint risks.

4. Provide employee guidance on new security scams

With a workforce on high alert for communications and news on COVID-19, cybercriminals may take advantage of people’s interest in the subject via email scams. While building awareness of and providing guidance on phishing attempts should already be part of your company’s cybersecurity policy, it’s important to revisit how employees can defend themselves against scammers.

The Beginners 2024 Cyber Security Awareness Training Course

Last Updated April 2024

  • 52 lectures
  • Beginner Level
4.6 (20,520)

Learn to Spot Targeted Email Phishing, Social Engineering Attacks, Hacker Tactics, Browser & Mobile Threats & Much More | By Reza Zaheri

Explore Course

Proactively outline safeguards employees should take to avoid falling victim to a phishing scam. For instance:

On the back end, if your company hasn’t already invested in security prevention software, now is the time to investigate solutions that prevent suspicious emails from reaching employees.

IT operations 

With companies instructing their employees to work from home for the foreseeable future, IT leaders should adapt their internal guidance to account for the unique requirements of employees now working remotely. Here’s how your team can help employees make a seamless transition to remote work.

1. Maintain consistent and transparent IT support 

The new normal for IT teams will likely be centered around troubleshooting a fresh set of issues daily — from home office setup to internet bandwidth to home networking. In addition to ensuring VPN infrastructure is intact, there will be questions on cables, routers, and even monitor recommendations. 

Because employees can no longer swing by the office IT department and there are many new variables in technology usage, it’s crucial that your team is available and transparent on issues that may arise. A few ways your IT team can provide support for employees include:

2. Double down on communication & productivity apps

Vital to the successful transition to a remote workforce is the compulsory use of products that enhance communication and project management. Institute collaborative tools like Slack or Microsoft Teams for chat, Zoom or GoToMeeting for meetings and facetime, Asana or Jira for project management, and Google Drive for a cloud-based office suite. 

For optimal use of tools like video conferencing, we recommend that employees use a laptop or external webcam. The nuance and connection of face-to-face communication don’t have to be lost in a remote company.

3. Keep an eye on security

It’s worth repeating that the security of your systems is crucial right now to keep operations running as normal. Instruct your team to proactively stay up to date with relevant patches and updates to the tools used across the company. Vendors with cloud-based products are seeing a spike in usage as global businesses go remote, so their products are adapting quickly. Stay well informed of potential risks by taking bug reports from your employees seriously, maintaining regular communication with vendors, and following industry news sources.

IT infrastructure

Ensuring your IT infrastructure is prepared for a crisis is also an integral part of an IT business continuity strategy. Here are a few tips to build a technical infrastructure that can maintain your company’s systems in a time of uncertainty and change.

1. For flexibility, adopt hybrid cloud infrastructure

Build your infrastructure on a highly flexible cloud environment. Don’t rely on a single public cloud provider for compute capacity. Build a hybrid infrastructure consisting of a private cloud (a hosted data center at a third-party offsite location) and a public cloud (a service like AWS, Azure, or Google Cloud). A hybrid approach allows you to quickly scale your systems by adding more server capacity to your public cloud platform as needed. Not only is it more efficient for your systems, but it also keeps your cloud budget under control. As site usage ebbs and flows, so can your server use and its related costs.

2. For high availability, create redundancy

Your infrastructure goal is to have at least N+1 redundancy or no single points of failure anywhere within your infrastructure platform. To achieve this, your site shouldn’t rely on a single internet service provider. Instead, use multiple providers, which helps achieve high-availability goals.

3. For quick response times, use DevOps automation

Rely on DevOps automation tools and processes to ensure rapid response times. Embrace a strong DevOps mindset. Create a well-defined process for change and incident management with good visibility into your products’ key performance metrics. 

Within the DevOps practice is a feature called Infrastructure as Code (IaC), an important automation tool as you scale cloud environments to accommodate site usage. IaC automates the provisioning of IT infrastructure so that engineers don’t have to manually provision servers or storage as they develop and deploy new applications.

Learn DevOps: Infrastructure Automation With Terraform

Last Updated October 2023

  • 120 lectures
  • Beginner Level
4.4 (14,805)

Learn how to automate your infrastructure with terraform. Covers Terraform with AWS, Packer, Docker, ECS, EKS, Jenkins | By Edward Viaene

Explore Course

As Udemy’s HR leaders have noted, this is the time to lead with connection and empathy. Tech leaders in IT, security, and software engineering are quickly redeveloping business norms to face an uncertain time. By pivoting processes quickly and maintaining clear lines of communication with employees, your technology investments will continue to support business continuity in a new remote workplace.

Empower your team. Lead the industry.

Get a subscription to a library of online courses and digital learning tools for your organization with Udemy Business.

Request a demo

Page Last Updated: April 2020