Story image

Why mandating strong cybersecurity for your remote workforce matters

30 Apr 18

Modern technology has enabled organisations and their employees to work from almost any location but according to Trend Micro those organisations must ensure cybersecurity hygiene is part of the package.

Morgan McKinley research found that 50% of employees in Singapore offer work-from-home arrangements, in which workers can use a variety of endpoint from different locations to access their organisation’s systems and assets.

However Trend Micro warns that employees who use unprotected public or home internet connections are putting their organisation, its networks, assets, and intellectual property at risk – particularly when they bring their potentially infected devices back into the office.

One of the major concerns about remote working situations is the lack of proper security in place on employees’ devices, including their home routers. Trend Micro says the router is the central connection hub for all devices including computers, smartphones, and other endpoints employees use.

“In this way, if robust security isn't in place at this critical juncture, employees leveraging their home network for work activity could be opening themselves up to considerable risk. Worst of all, a device infected at home could potentially impact the entire enterprise network once the staff member brings the endpoint back to the office for work.”

The company says there are three important issues IT teams should consider:

·         Incorrectly configured networks: This can extend to a range of different factors, but the bottom line is that an incorrectly configured network can provide an easy open door for malicious actors.

·         Default or weak passwords: If employees don't adjust the security credentials of their routers and keep the default password in place – or use a password that is considerably easy to guess – it presents low hanging fruit for hackers. It's imperative that default credentials are replaced with strong passwords once the home network equipment is deployed.

·         Firmware updates: Not updating devices with the latest patches can also create easily exploitable vulnerabilities that result in significant security gaps and other problems.

Trend Micro says that Remote Desktop Protocol (RDP) attacks can also be used to brute force logins of home devices. If a hacker compromises a device, they are able to run malware that spreads to enterprise networks the next time the device is used at the office.

“RDP enables a user to interact with a system as if they are a local user, providing access to the operating system and applications. In this way, a hacker could remotely access login capabilities, and use brute force to breach and glean details about users and who has control of what devices.”

"The risk lies in the network, when a hacker is able to gain access to the RDP without the user admin knowing. The home network is where all the connected devices and stored data lie."

The company cites a real-life example of device compromise in action. In one case an employee took his work laptop home so he could conduct work from outside the office.

The employee’s daughter also accessed her emails on the work laptop. One of those emails contained an email attachment with the Sircam malware.

The employee was unaware of the infection and took the laptop back to the office, where the infection spread across the corporate network.

“Luckily for the employee and the small business he worked for, the infection was spotted on the company network and systems were disconnected before it could spread further or damage machines. The instance did result in downtime for the company, during which the network had to be cleansed and employees were unable to access mission-critical assets,” Trend Micro says.

“Overall, it's important to ensure that employees take the appropriate security precautions when taking part in work activity from their home networks.”

Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
The disaster recovery-as-a-service market is on the rise
As time progresses and advanced technologies are implemented, the demand for disaster recovery-as-a-service is also expected to increase.
Cohesity signs new reseller and cloud service provider in Australia
NEXION Networks has been appointed as an authorised reseller of Cohesity’s range of solutions for secondary data.
The key to financial institutions’ path to digital dominance
By 2020, about 1.7 megabytes a second of new information will be created for every human being on the planet.
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
NVIDIA sets records with their enterprise AI
The new MLPerf benchmark suite measures a wide range of deep learning workloads, aiming to serve as the industry’s first objective AI benchmark suite.
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.