Story image

Why mandating strong cybersecurity for your remote workforce matters

30 Apr 18

Modern technology has enabled organisations and their employees to work from almost any location but according to Trend Micro those organisations must ensure cybersecurity hygiene is part of the package.

Morgan McKinley research found that 50% of employees in Singapore offer work-from-home arrangements, in which workers can use a variety of endpoint from different locations to access their organisation’s systems and assets.

However Trend Micro warns that employees who use unprotected public or home internet connections are putting their organisation, its networks, assets, and intellectual property at risk – particularly when they bring their potentially infected devices back into the office.

One of the major concerns about remote working situations is the lack of proper security in place on employees’ devices, including their home routers. Trend Micro says the router is the central connection hub for all devices including computers, smartphones, and other endpoints employees use.

“In this way, if robust security isn't in place at this critical juncture, employees leveraging their home network for work activity could be opening themselves up to considerable risk. Worst of all, a device infected at home could potentially impact the entire enterprise network once the staff member brings the endpoint back to the office for work.”

The company says there are three important issues IT teams should consider:

·         Incorrectly configured networks: This can extend to a range of different factors, but the bottom line is that an incorrectly configured network can provide an easy open door for malicious actors.

·         Default or weak passwords: If employees don't adjust the security credentials of their routers and keep the default password in place – or use a password that is considerably easy to guess – it presents low hanging fruit for hackers. It's imperative that default credentials are replaced with strong passwords once the home network equipment is deployed.

·         Firmware updates: Not updating devices with the latest patches can also create easily exploitable vulnerabilities that result in significant security gaps and other problems.

Trend Micro says that Remote Desktop Protocol (RDP) attacks can also be used to brute force logins of home devices. If a hacker compromises a device, they are able to run malware that spreads to enterprise networks the next time the device is used at the office.

“RDP enables a user to interact with a system as if they are a local user, providing access to the operating system and applications. In this way, a hacker could remotely access login capabilities, and use brute force to breach and glean details about users and who has control of what devices.”

"The risk lies in the network, when a hacker is able to gain access to the RDP without the user admin knowing. The home network is where all the connected devices and stored data lie."

The company cites a real-life example of device compromise in action. In one case an employee took his work laptop home so he could conduct work from outside the office.

The employee’s daughter also accessed her emails on the work laptop. One of those emails contained an email attachment with the Sircam malware.

The employee was unaware of the infection and took the laptop back to the office, where the infection spread across the corporate network.

“Luckily for the employee and the small business he worked for, the infection was spotted on the company network and systems were disconnected before it could spread further or damage machines. The instance did result in downtime for the company, during which the network had to be cleansed and employees were unable to access mission-critical assets,” Trend Micro says.

“Overall, it's important to ensure that employees take the appropriate security precautions when taking part in work activity from their home networks.”

Symantec releases neural network-integrated USB scanning station
Symantec Industrial Control System Protection Neural helps defend against USB-borne cyber attacks on operational technology.
Ramping up security with next-gen firewalls
The classic firewall lacked the ability to distinguish between different kinds of web traffic.
Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. 
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Securing hotel technology to protect customer information
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.