Challenges and Solutions

Challenges and Solutions

Organizations with remote workers should stand up to any threat

Technological advancements are resulting in trends and movements that improve the quality of life and business. One such trend is the “distributed workforce,” wherein organizations are willing and able to employ staff without any strict requirements for physical presence in offices. Time saved by avoiding long commutes has been utilized to increase employee productivity as well as work-life balance. Research in 2016 found that around half of U.S. workers held jobs that allowed them to work remotely at least part of the time.

Unfortunately, technological advancement often engages in a tug-of-war with security. This rise in remote working has led to a host of security challenges that attackers continue to leverage while targeting enterprises. Whether it is lack of awareness, lenient policy enforcement, or deceptive attacker techniques, the result is a likely breach with serious repercussions. With the monetary impact of cyberattacks expected to rise to $2.1 trillion by 2019, the business risk is real and present.

All in the Cloud

Although cloud adoption has increased across the board, employees working from home are much more likely to use a range of cloud-hosted applications to perform their daily tasks. While applications bought for and maintained by employers are generally more secure, employees tend to use multiple open-source and free-to-use applications for actions ranging from file conversion to file transfer across systems.

Each application added to a company’s “fingerprint” increases the chances of compromise, both due to employee login data that can be vulnerable and the actual company files that are stored/converted/transferred using these applications.

I Spy a Wi-Fi

When employees work from home or any public place outside enterprise networks (such as coffee shops), they leave their devices open to attack because of security risks inherent in public Wi-Fi networks. Attackers can mimic public Wi-Fi networks and trick their targets into joining the fake network, or attackers can join a legitimate public Wi-Fi network and tunnel into target devices (especially if employees have turned on their device discoverability).

Late last year, there was a deadly root access bug uncovered in Apple devices that allowed attackers to gain administrator access on target systems and cause dangerous levels of compromise. While that bug is patched and fixed now, the security threat of public Wi-Fi networks remains.

Awareness Issues

The most secure cyber defenses cannot stand up to human error. Even if organizations are aware of security threats and communicate them to employees, ingesting and retaining this communication is often not incentivized enough (or not interesting enough) for employees. This leads to reduced awareness levels and employees repeating the same mistakes that—if they’re working remotely— are much likelier to lead to successful cyberattacks.

What can we do?

Improving organizational security for remote workers is not rocket science, and many points this article mentions might seem self-evident. Nonetheless, it’s surprising how often simple fixes go ignored. The following suggestions are a good starting place to ensure that organizations stay secure while continuing to promote the positive aspects of remote work.

Str!ct P@ssw0rds

Make sure that employees use strong passwords and that they use different passwords across systems. A single password used across applications might be convenient but it then takes just one vulnerability to compromise all the employee’s accounts. For guidelines on password strength, you can refer to NIST’s latest identity guidelines.

Historically, lengthy passwords with a combination of letters, numbers, and special characters are less likely to get breached through brute force. Contrary to popular opinion, NIST recommends against changing passwords regularly. Employees usually change just a couple of characters from password to password this way, leading to confusion without increased security.

VPNs Are A Must

Whether employees are working from home or any other public location, organizations should ensure that Virtual Private Networks or VPNs are used. By combining encryption protocols and virtual P2P connections, VPNs protect any sensitive company data that employees might access while connected to non-enterprise public/private networks.

There are various VPN protocols out there: some provide encryption, some facilitate connections, and some do both. Protocols such as SSH, SSL, or TLS fulfill both duties (encryption and connection) and should be preferred by organizations that aim for security as well as convenience.

Awareness Programs with A Twist

Security awareness programs delivered through dry, text-heavy presentations are unlikely to have the intended effects, no matter how positive the intent. A few tactical tweaks to awareness programs can drastically improve uptake:

  • Including interactive, engaging assignments as part of the training. For example, a “design your own phishing email” contest where employees come up with their best phishing emails.
  • Encouraging and rewarding employees that show “good security behaviors” and sharing their successes with the group.
  • Learning from security failures and sharing with transparency to avoid repetitive mistakes.
  • Creating a culture of openness and blamelessness so that employees that have made mistakes come forward honestly without fear of being punished.

Update, Patch, Maintain

Devices with out-of-date software, certificates, and agents create conditions where compromise becomes easier and more likely. Organizations should monitor the version recency of operating systems, SSL certificates, and security software (such as firewalls and endpoint tools) on all employee devices and especially those that avail of remote work.

Although any deficiencies along these lines won’t create security incidents on their own, they will weaken a device’s “immune system.” Attackers will usually scan devices for these deficiencies and target accordingly.

These solutions are by no means exhaustive, but they represent “first-pass” guidelines that organizations can set up and build upon. Even with all these precautions (and more) in place, it’s inevitable that breaches will occur. But by being proactive in defense and agile in response, organizations and their remote workers stand a good chance of coming out on top.

This article originally appeared in the November/December 2018 issue of Security Today.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.