If you’re like many organizations right now, you’ve probably embraced a work-from-home policy. But are you implementing it securely? Enabling workers to access the systems and data they need from home can create a wide range of cyber risks that attackers can be quick to exploit. Here are some of the most critical vulnerabilities that enterprises of all sizes need to watch out for.
VPN Misconfigurations
Organizations commonly use Virtual Private Networks (VPNs) to enable remote workers to access corporate applications and data. Your chosen VPN solution should be reviewed to ensure that it is hardened to prevent attackers from accessing your network and intercepting communications. This includes ensuring that VPN split-tunneling — used to reduce impact on bandwidth — is implemented as securely as possible.
Cloud Misconfigurations
Flaws in the way that cloud platforms and software as a service (SaaS) applications such as Microsoft 365 and G Suite are set up could leave data and assets exposed. Your cloud and hybrid environments should be thoroughly inspected to identify risks and provide guidance to help ensure workloads are hardened in line with the latest security best practices.
Improper Access Controls
To ensure remote workers are able to access the systems they need outside the office, many organizations relax security settings such as IP address whitelisting. Use of access management technologies such as cloud access security broker (CASB) and zero-trust network access (ZTNA) can help to reduce risk, but these tools aren’t always optimally configured. All-access controls should be reviewed to ensure that they are implemented securely and configured with the latest threats in mind.
Bring-Your-Own-Device

Firewall Misconfigurations
Firewall misconfigurations can provide an opportunity for an attacker to obtain easy access to a network, install malware, and conduct command-and-control activity. You should review your organization’s firewall settings to identify open ports and brush up on firewall policies to help ensure they adhere to the principle of “least privilege.”
Remote Desktop Protocol Flaws
Remote Desktop Protocol (RDP) is used by remote employees to connect to and access servers and other devices. It’s imperative to check that RDP is configured securely and free of vulnerabilities which could allow cybercriminals to remotely take over unpatched devices.
This list may seem like a lot of items to go over, but a proper assessment of each component is absolutely necessary. We understand that you’re trying to manage an organization and may not have the time or knowledge required to go through everything with a fine-tooth comb -—especially now during a time that many businesses are struggling to keep up. Let V2 give you a remote work security assessment. It will take a lot off your plate and will ensure your organization’s security both during and after the pandemic.
Since 1995, Manassas Park, VA-based V2 Systems has employed local systems administrators, network engineers, security consultants, help desk technicians and partnering companies to meet a wide range of clients’ IT needs, from research, to implementation, to maintenance. Concentrate on your VISION…We’ll handle the TECHNOLOGY!
