Before the outbreak of Coronavirus, working from home was common, but not universal. About 43 percent of Americans worked from home occasionally in 2017, and about 5 percent worked from home full-time. Now that most of the country (and the world) is under lockdown, the numbers are skewed far into the other direction.
While we are beginning to take cautious steps to open back up, working from home will be the norm for many of us for the foreseeable future. If you are like most, you may have had a security contingency for a small percentage of workers working from home either occasionally or full-time, but your security posture looks vastly different now.
For example, until now, your solution for working from home or from the road might have been accomplished with a basic combination of VPN + virtual desktop. Since only a few people would be traveling or working from home at any given time, you might not have paid that much attention to the way your VPN was managed.
What many companies are now discovering is that, while their corporate network is fully segmented to protect the east-west movement of attackers, their relatively unmanaged VPN is totally flat.
Security organizations need to pivot rapidly now that the majority of the workforce is working remotely. If their existing tools are now insufficient, they need to find new ones that work effectively and that can be deployed quickly. After all, the attackers have been working from home all along – and now they’re encountering an enticingly target-rich environment. New threats may include:
APTs are taking advantage of several endemic vulnerabilities in VPN systems in order to exploit a newly homebound workforce. Because these networks often need 24/7 uptime, they are difficult to update, meaning that known issues may not be patched. This makes it easy for state actors to craft malware that can exploit these vulnerabilities en masse.
The thing about constant anxiety is that it can lower the defenses of people who otherwise wouldn’t be fooled by misinformation. Scammers are sending out waves of emails purporting to offer free Coronavirus tests, masks, protective equipment, and dubious cures. One enterprising attacker even offers ransomware known as CovidLock disguised as an Android app that tracks local COVID-19 outbreaks. In addition, researchers have also seen a surge in more traditional phishing emails that are designed to harvest VPN credentials.
The consumer-grade WiFi products that workers use at home aren’t as secure as their enterprise equivalents. Many home users don’t know how to update their routers, which means that their firmware can be years out of date. This is catnip for attackers, who can use open-source tools such as Aircrack or Reaver-wps to crack WPA or WPA2 encryption and burrow into a home network – then make the jump from there to your enterprise.
Administrators may need to find new tools in the wake of these new attack vectors. What do these tools look like, and how should they be adapted for remote users?
Being unable to physically work on a user’s endpoint or provision them with new hardware or software may impose challenges for IT security – but they aren’t insurmountable. With encryption and the right kind of remote access software, you’ll be able to protect your users and your network, while ensuring your most critical data is secured.
Written By:
Gerry Grealish is Chief Marketing Officer at Ericom Software. He is a security industry veteran, bringing over 20 years of Marketing and product experience in cybersecurity and related technologies. Responsible for Marketing and Business Development, Gerry previously was at Symantec, where he was responsible for the Go-To-Market activities for the company’s Network Security portfolio. Prior to Symantec, Gerry was at Blue Coat, which he joined as part of Blue Coat’s acquisition of venture-backed CASB innovator, Perspecsys, where he was CMO.
All the recruiting news you see here, delivered straight to your inbox.
Just enter your e-mail address below
1801 members
316 members
180 members
190 members
222 members
34 members
62 members
194 members
619 members
530 members
© 2024 All Rights Reserved Powered by
Badges | Report an Issue | Privacy Policy | Terms of Service
With over 100K strong in our network, RecruitingBlogs.com is part of the RecruitingDaily.com, LLC family of Recruiting and HR communities.
Our goal is to provide information that is meaningful. Without compromise, our community comes first.
One Reservoir Corporate Drive
4 Research Drive – Suite 402
Shelton, CT 06484
Email us: info@recruitingdaily.com
All the recruiting news you see here, delivered straight to your inbox.
Just enter your e-mail address below
You need to be a member of RecruitingBlogs to add comments!
Join RecruitingBlogs