Let Them Work From Home, But Don’t Leave Yourself Vulnerable

Jul 27, 2021 | Cyber Security, IT News

If you’re like many organizations right now, you’ve probably embraced a work-from-home policy. Even as things start slowly returning to normalcy, many organizations — and especially employees — are choosing to remain within a remote work or hybrid framework. But are you implementing it securely? Enabling workers to access the systems and data they need from home can create a wide range of cyber risks that attackers can be quick to exploit. Here are some of the most critical vulnerabilities that enterprises of all sizes need to watch out for.

VPN Vulnerability

Organizations commonly use Virtual Private Networks (VPNs) to enable remote workers to access corporate applications and data. Your chosen VPN solution should be reviewed to ensure that it is hardened to prevent attackers from accessing your network and intercepting communications. This includes ensuring that VPN split-tunneling — used to reduce impact on bandwidth — is implemented as securely as possible.

Cloud Vulnerability

Flaws in the way that cloud platforms and software as a service (SaaS) applications such as Microsoft 365 and G Suite are set up could leave data and assets exposed. Your cloud and hybrid environments should be thoroughly inspected to identify risks and provide guidance to ensure workloads are hardened in line with the latest security best practices.

Access Management

To ensure remote workers are able to access the systems they need outside the office, many organizations relax security settings such as IP address whitelisting. Use of access management technologies such as cloud access security broker (CASB) and zero-trust network access (ZTNA) can help to reduce risk, but these tools aren’t always optimally configured. All-access controls should be reviewed to ensure that they are implemented securely and configured with the latest threats in mind.

BYOD

“Bring your own device” — or BYOD — is the practice of allowing employees to use their own devices to access company networks. Some organizations use remote access technologies, application containers and application wrapping to mitigate the associated risks, but these need to be implemented securely. Your organization’s BYOD policy and controls should be reviewed to help identify where and how improvements can be made.

Firewall Vulnerability

Firewall misconfigurations can provide an opportunity for an attacker to obtain easy access to a network, install malware, and conduct command-and-control activity. You should review your organization’s firewall settings to identify open ports and brush up on firewall policies to help ensure they adhere to the principle of “least privilege.”

RDP Vulnerability

Remote Desktop Protocol (RDP) is used by remote employees to connect to and access servers and other devices. It’s imperative to check that RDP is configured securely and free of vulnerabilities which could allow cybercriminals to remotely take over unpatched devices.

This list may seem like a lot of items to go over, but a proper assessment of each component is absolutely necessary. We understand that you’re trying to manage an organization and may not have the time or knowledge required to go through everything with a fine-tooth comb — especially now during a time that many businesses are struggling to keep up. Let V2 give you a remote work security assessment. It will take a lot off your plate and will ensure your organization’s security both during and after the pandemic.

Since 1995, Manassas Park, VA-based V2 Systems has employed local systems administrators, network engineers, security consultants, help desk technicians and partnering companies to meet a wide range of clients’ IT needs, from research, to implementation, to maintenance. Concentrate on your VISION…We’ll handle the TECHNOLOGY!

More From V2 Systems

The Audit Readiness Problem Government Contractors Can’t Afford to Ignore

Many government contractors are not failing audits because they lack tools. They are failing because documentation is incomplete, evidence is disorganized, and readiness starts too late. This blog explains the most common gaps and how to fix them before an audit begins.

You Can’t Secure What You Can’t See: Why Asset Visibility Is a Cybersecurity Requirement

Asset visibility is one of the most overlooked parts of cybersecurity. In this blog, we explain why businesses need clear visibility into hardware, software, users, and cloud assets to reduce risk, strengthen operations, and support compliance.

When One Suspicious Alert Prevented a Much Bigger Disaster

A former client narrowly avoided a much larger cybersecurity incident after suspicious Microsoft 365 activity revealed an unauthorized intrusion. In this blog, we break down what happened, how phishing may have played a role, why MFA still matters, and what businesses should do next to reduce risk and respond quickly.

CMMC in Practice: How Day-to-Day IT Operations Affect Compliance

CMMC is not just policy. It depends on day-to-day IT execution like patching, access control, monitoring, and documentation. This blog explains what contractors should focus on now, plus why the assessment process can be more expensive than expected.

What Happens After the Breach: How Incident Response Really Works for SMBs

Incident response is what determines whether a cyber incident becomes a short disruption or a major business crisis. This blog explains the real steps SMBs should take after a breach and how MSP support speeds recovery.

Free
Small Business Cybersecurity Checklist

cybersecurity checklist graphic