Network Management

COVID-19 and Computer Security, Part 2: Shoring Up Systems for Remote Workers

As companies send employees home in an effort to curb the spread of COVID-19, cybersecurity experts are warning that telecommuting could be putting company assets and data at risk.

Employees working from home should consider a number of precautions to ensure that sensitive data isn’t compromised by cybercriminals taking advantage of the health crisis.

One of the biggest problems is that employees working remotely often become relaxed and can let their guard down. In other cases, workers wrongly assume that when they work at home, they have the same level of security protection as in the office.


Also see: COVID-19 and Computer Security, Part 1: Telecommuting Risks: Shoring Up Systems for Remote Workers


“Typically, when employees are inside of the corporate network, the enterprise security stack will protect them,” said Matias Katz, CEO of Byos.

“But working from home exposes the employee’s devices — and through them, the company’s network — to threats that exist on dirty public Wi-Fi networks,” he told TechNewsWorld.

New Opportunities for Cybercriminals

One significant security problem is that with so much data hosted in remote server farms or the cloud, that data is only as safe as the connections that can gain access to it. In an office, the systems can be better hardened, but allowing staff to work remotely can be akin to opening the gates to the barbarians.

“There’s no question that working outside the workplace can increase cyber risk,” said Elad Shapira, head of research at Panorays.

“For example, there will likely be more unmanageable devices being used to access company assets, which raises the likelihood of introducing compromised devices into a company’s network,” he told TechNewsWorld.

In addition, having more credentials that can access company assets, including the company’s virtual private network, increases the risk of every credential-related attack, such as credential stuffing and brute force.

For these reasons, ensuring that security policies are consistent and applied throughout can be extremely challenging.

“If procurement and security somehow were able to handle securing the few devices used for occasional remote work, they now have hundreds, if not thousands, of devices they need to secure,” warned Shapira.

Companies may need to enforce two-factor authentication across all assets and for all employees.

“Furthermore, many essential tasks are performed in the workplace face-to-face, including requests for financial transactions or IT service,” said Shapira. “By moving these in-person transactions to email, the organization becomes much more susceptible to phishing and email scams.”

Mitigating the Risks

During emergencies that may require staff to leave the office, an IT department should first ensure that employees are prepared and understand the risks of working remotely.

“It is always best practices to anticipate remote workers and have policies, procedures, and governance to help mitigate risk,” said LouMorentin, VP of compliance and risk management for Cerberus Sentinel.

“Many standards — including HIPAA, ISO, and HITRUST, for example –require controls for remote workers,” he told TechNewsWorld.

“Anytime a remote workforce accesses company resources, a VPN connection is recommended to secure data in transit,” Morentin added. If possible, work connections should be segregated from family traffic. Many modern consumer routers allow for segregated networks.”

The situation could be made worse if a home computer is being used to do office work remotely.

“It depends, of course, on a number of factors,” said Mark Foust, vice president of marketing for CloudJumper.

“Microsoft’s Windows Virtual Desktop functions as a Desktop as a service secondary desktop from the Azure cloud — and it’s surfaced as a Platform as a Service and has a greatly reduced security footprint,” he told TechNewsWorld.

This could allow a way for the IT department to separate company data from personal data on a personal computer.

“This presents an ideal solution for many remote work scenarios,” added Foust. “A secondary desktop, in WVD Azure, for example, is ideal for security and business continuity.”

Tools to Protect Employees and Data

A number of tools and protocols are worthy of consideration to help remote workers protect sensitive data.

“Single sign-on and multifactor authentication are critical technologies for the remote workforce and for minimizing risk for the business,” said Ralph Martino, vice president of product strategy at Stealthbits.

“These together allow the remote workforce to connect to business applications in the cloud or on-prem using one password,” he told TechNewsWorld.

“When the remote worker is terminated, the business can terminate access across a series of applications, minimizing the risk of misuse of an account that doesn’t get de-provisioned. This provides greater security and compliance for enabling the remote workforce,” Martino added.

As someone who has been working remotely for nearly a decade, Paul Bischoff, privacy advocate and researcher at Comparitech, suggested a number of tools.

“For digitizing physical paperwork and getting signatures, I use a document scanner (TinyScanner), PDF editor (Adobe Fill and Sign), and DocuSign,” he told TechNewsWorld.

“Wave is my preferred accounting and invoicing tool, while Slack is my day-to-day office chat room,” Bischoff added.

“A good backup service is essential so that remote employees don’t lose work, and Zoom is a solid professional-grade video conferencing tool,” he noted.

To VPN or Not to VPN

Many corporations may want to roll out VPNs to more employees to access office resources and secure storage, but this shouldn’t be seen as a hardened defense. VPNs have many shortcomings that users do not readily consider.

“Some of the many device threats that VPNs can’t protect against are eavesdropping, exploits, and lateral spreading of attackers and malware,” said Byos’ Katz.

“That’s because VPNs only encrypt data in transit but don’t protect where the data is residing — the user’s device,” he explained.

“Once an attacker or malware gets into a device, they often go undetected, seizing or manipulating data with the ultimate goal of moving from the single remote laptop or tablet into the big prize: the company network and servers,” warned Katz.

Even with the best security in place, employees are just one of the many potential weak links in a chain.

“It’s one thing if a large organization, presumably with robust security processes in place, implements a work-from-home policy for its employees,” said Panorays’ Shapira.

“What happens, however, when one of its supply chain partners does the same? In that case, the organization needs to be able also to check that its supply chain partners adhere to that same high level of security,” he added.

For this reason, a comprehensive plan needs to be drawn up. While it could be too late for the current COVID-19 crisis, forward-thinking will make it easier to send teams home to be safe from illness and secure from cyber threats.

“With the right tools, policies, and procedures in place,” said Shapira, “organizations can be assured that their company and third parties’ cyber posture remains strong, even outside the workplace.”

Peter Suciu

Peter Suciu has been an ECT News Network reporter since 2012. His areas of focus include cybersecurity, mobile phones, displays, streaming media, pay TV and autonomous vehicles. He has written and edited for numerous publications and websites, including Newsweek, Wired and FoxNews.com.Email Peter.

Leave a Comment

Please sign in to post or reply to a comment. New users create a free account.

More by Peter Suciu
More in Network Management

Technewsworld Channels