Working from home? An assessment is long overdue.

Dec 10, 2020 | Cyber Security, IT News

If you’re like many organizations right now, you’ve probably embraced a work-from-home policy. But are you implementing it securely? Enabling workers to access the systems and data they need from home can create a wide range of cyber risks that attackers can be quick to exploit. Here are some of the most critical vulnerabilities that enterprises of all sizes need to watch out for.

VPN Misconfigurations

Organizations commonly use Virtual Private Networks (VPNs) to enable remote workers to access corporate applications and data. Your chosen VPN solution should be reviewed to ensure that it is hardened to prevent attackers from accessing your network and intercepting communications. This includes ensuring that VPN split-tunneling — used to reduce impact on bandwidth — is implemented as securely as possible.

Cloud Misconfigurations

Flaws in the way that cloud platforms and software as a service (SaaS) applications such as Microsoft 365 and G Suite are set up could leave data and assets exposed. Your cloud and hybrid environments should be thoroughly inspected to identify risks and provide guidance to help ensure workloads are hardened in line with the latest security best practices.

Improper Access Controls

To ensure remote workers are able to access the systems they need outside the office, many organizations relax security settings such as IP address whitelisting. Use of access management technologies such as cloud access security broker (CASB) and zero-trust network access (ZTNA) can help to reduce risk, but these tools aren’t always optimally configured. All-access controls should be reviewed to ensure that they are implemented securely and configured with the latest threats in mind.

Bring-Your-Own-Device

Working from home? An assessment is long overdue.BYOD is the practice of allowing employees to use their own devices to access company networks. Some organizations use remote access technologies, application containers and application wrapping to mitigate the associated risks, but these need to be implemented securely. Your organization’s BYOD policy and controls should be reviewed to help identify where and how improvements can be made.

Firewall Misconfigurations

Firewall misconfigurations can provide an opportunity for an attacker to obtain easy access to a network, install malware, and conduct command-and-control activity. You should review your organization’s firewall settings to identify open ports and brush up on firewall policies to help ensure they adhere to the principle of “least privilege.”

Remote Desktop Protocol Flaws

Remote Desktop Protocol (RDP) is used by remote employees to connect to and access servers and other devices. It’s imperative to check that RDP is configured securely and free of vulnerabilities which could allow cybercriminals to remotely take over unpatched devices.

This list may seem like a lot of items to go over, but a proper assessment of each component is absolutely necessary. We understand that you’re trying to manage an organization and may not have the time or knowledge required to go through everything with a fine-tooth comb -—especially now during a time that many businesses are struggling to keep up. Let V2 give you a remote work security assessment. It will take a lot off your plate and will ensure your organization’s security both during and after the pandemic.

Since 1995, Manassas Park, VA-based V2 Systems has employed local systems administrators, network engineers, security consultants, help desk technicians and partnering companies to meet a wide range of clients’ IT needs, from research, to implementation, to maintenance. Concentrate on your VISION…We’ll handle the TECHNOLOGY!

More From V2 Systems

When One Suspicious Alert Prevented a Much Bigger Disaster

A former client narrowly avoided a much larger cybersecurity incident after suspicious Microsoft 365 activity revealed an unauthorized intrusion. In this blog, we break down what happened, how phishing may have played a role, why MFA still matters, and what businesses should do next to reduce risk and respond quickly.

CMMC in Practice: How Day-to-Day IT Operations Affect Compliance

CMMC is not just policy. It depends on day-to-day IT execution like patching, access control, monitoring, and documentation. This blog explains what contractors should focus on now, plus why the assessment process can be more expensive than expected.

What Happens After the Breach: How Incident Response Really Works for SMBs

Incident response is what determines whether a cyber incident becomes a short disruption or a major business crisis. This blog explains the real steps SMBs should take after a breach and how MSP support speeds recovery.

From Policy to Practice: Why Cybersecurity Fails Without Daily Execution

Cybersecurity policies and tools do not protect businesses unless they are executed consistently. This blog explains why daily operational discipline matters and how MSP support helps turn security into repeatable routines.

Why Professional Services Firms Are Prime Cyber Targets in 2026 and How MSPs Help Reduce Risk

Law firms, accounting firms, engineering companies, nonprofits, and healthcare organizations are increasingly targeted by cybercriminals. This blog explains why professional services firms face higher risk in 2026 and how MSPs help secure operations without slowing productivity.

Free
Small Business Cybersecurity Checklist

cybersecurity checklist graphic