Challenges and Solutions

Challenges and Solutions

Organizations with remote workers should stand up to any threat

Technological advancements are resulting in trends and movements that improve the quality of life and business. One such trend is the “distributed workforce,” wherein organizations are willing and able to employ staff without any strict requirements for physical presence in offices. Time saved by avoiding long commutes has been utilized to increase employee productivity as well as work-life balance. Research in 2016 found that around half of U.S. workers held jobs that allowed them to work remotely at least part of the time.

Unfortunately, technological advancement often engages in a tug-of-war with security. This rise in remote working has led to a host of security challenges that attackers continue to leverage while targeting enterprises. Whether it is lack of awareness, lenient policy enforcement, or deceptive attacker techniques, the result is a likely breach with serious repercussions. With the monetary impact of cyberattacks expected to rise to $2.1 trillion by 2019, the business risk is real and present.

All in the Cloud

Although cloud adoption has increased across the board, employees working from home are much more likely to use a range of cloud-hosted applications to perform their daily tasks. While applications bought for and maintained by employers are generally more secure, employees tend to use multiple open-source and free-to-use applications for actions ranging from file conversion to file transfer across systems.

Each application added to a company’s “fingerprint” increases the chances of compromise, both due to employee login data that can be vulnerable and the actual company files that are stored/converted/transferred using these applications.

I Spy a Wi-Fi

When employees work from home or any public place outside enterprise networks (such as coffee shops), they leave their devices open to attack because of security risks inherent in public Wi-Fi networks. Attackers can mimic public Wi-Fi networks and trick their targets into joining the fake network, or attackers can join a legitimate public Wi-Fi network and tunnel into target devices (especially if employees have turned on their device discoverability).

Late last year, there was a deadly root access bug uncovered in Apple devices that allowed attackers to gain administrator access on target systems and cause dangerous levels of compromise. While that bug is patched and fixed now, the security threat of public Wi-Fi networks remains.

Awareness Issues

The most secure cyber defenses cannot stand up to human error. Even if organizations are aware of security threats and communicate them to employees, ingesting and retaining this communication is often not incentivized enough (or not interesting enough) for employees. This leads to reduced awareness levels and employees repeating the same mistakes that—if they’re working remotely— are much likelier to lead to successful cyberattacks.

What can we do?

Improving organizational security for remote workers is not rocket science, and many points this article mentions might seem self-evident. Nonetheless, it’s surprising how often simple fixes go ignored. The following suggestions are a good starting place to ensure that organizations stay secure while continuing to promote the positive aspects of remote work.

Str!ct P@ssw0rds

Make sure that employees use strong passwords and that they use different passwords across systems. A single password used across applications might be convenient but it then takes just one vulnerability to compromise all the employee’s accounts. For guidelines on password strength, you can refer to NIST’s latest identity guidelines.

Historically, lengthy passwords with a combination of letters, numbers, and special characters are less likely to get breached through brute force. Contrary to popular opinion, NIST recommends against changing passwords regularly. Employees usually change just a couple of characters from password to password this way, leading to confusion without increased security.

VPNs Are A Must

Whether employees are working from home or any other public location, organizations should ensure that Virtual Private Networks or VPNs are used. By combining encryption protocols and virtual P2P connections, VPNs protect any sensitive company data that employees might access while connected to non-enterprise public/private networks.

There are various VPN protocols out there: some provide encryption, some facilitate connections, and some do both. Protocols such as SSH, SSL, or TLS fulfill both duties (encryption and connection) and should be preferred by organizations that aim for security as well as convenience.

Awareness Programs with A Twist

Security awareness programs delivered through dry, text-heavy presentations are unlikely to have the intended effects, no matter how positive the intent. A few tactical tweaks to awareness programs can drastically improve uptake:

  • Including interactive, engaging assignments as part of the training. For example, a “design your own phishing email” contest where employees come up with their best phishing emails.
  • Encouraging and rewarding employees that show “good security behaviors” and sharing their successes with the group.
  • Learning from security failures and sharing with transparency to avoid repetitive mistakes.
  • Creating a culture of openness and blamelessness so that employees that have made mistakes come forward honestly without fear of being punished.

Update, Patch, Maintain

Devices with out-of-date software, certificates, and agents create conditions where compromise becomes easier and more likely. Organizations should monitor the version recency of operating systems, SSL certificates, and security software (such as firewalls and endpoint tools) on all employee devices and especially those that avail of remote work.

Although any deficiencies along these lines won’t create security incidents on their own, they will weaken a device’s “immune system.” Attackers will usually scan devices for these deficiencies and target accordingly.

These solutions are by no means exhaustive, but they represent “first-pass” guidelines that organizations can set up and build upon. Even with all these precautions (and more) in place, it’s inevitable that breaches will occur. But by being proactive in defense and agile in response, organizations and their remote workers stand a good chance of coming out on top.

This article originally appeared in the November/December 2018 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Survey: Only 13 Percent of Research Institutions Are Prepared for AI

    A new survey commissioned by SHI International and Dell Technologies underscores the transformative potential of artificial intelligence (AI) while exposing significant gaps in preparedness at many research institutions. Read Now

  • Survey: 70 Percent of Organizations Have Established Dedicated SaaS Security Teams

    Seventy percent of organizations have prioritized investment in SaaS security, establishing dedicated SaaS security teams, despite economic uncertainty and workforce reductions. This was a key finding in the fourth Annual SaaS Security Survey Report: 2025 CISO Plans and Priorities released today by the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Mobile Applications Are Empowering Security Personnel

    From real-time surveillance and access control management to remote monitoring and communications, a new generation of mobile applications is empowering security personnel to protect people and places. Mobile applications for physical security systems are emerging as indispensable tools to enhance safety. They also offer many features that are reshaping how modern security professionals approach their work. Read Now

Featured Cybersecurity

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3