- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
The current situation around the coronavirus poses great challenges for everyone and home office on a large scale is now a reality for many organizations and companies in the long term.
It is
inevitable that a lot of gaps and problems will arise when it comes to the
performance of the IT equipment at home - and to ensuring that they can
continue to work safely and effectively. It is to be hoped that your
company has long-term established guidelines for working from home, which can
also be expanded with recovery plans and current disaster management if
necessary. But not every work environment is suitable for offering this to
all employees who are able to do all or part of their work remotely.
The
challenges we face here are many and varied: Basic IT equipment and software
maintenance will be problematic. The boundaries of a company's network -
and thus its attack surface - are expanding exponentially. Much data is
now physically stored or made accessible outside of the company's own
boundaries.
After all
- and this is particularly important - all people without exception are
increasingly exposed to stress, anxiety and lack of information. We're all
likely now more vulnerable to social engineering attacks and similar scams, and
we're also more inclined to take shortcuts to just get things done quickly -
and safeguards are thrown overboard.
As we
adapt to unfamiliar ways of living and working, it pays to reconsider the
potential risks of extensive home work and to take active measures to assess
and protect them. There is no specific order for this, but below are some
of the immediate concerns.
Home Networking
Consumer-grade
broadband connections often suffer from poor WiFi configurations, inadequately
secured devices, outdated protocols, and so on. Extracting log data and
remotely managing these networks is not only difficult, but often impossible. The
old advice to ensure the best connection if possible via an Ethernet connection
can help here - but only in connection with the use of VPNs.
Firewalls, VPNs, and Security Breach Investigations
Identity
and access management (IAM) is critical, as is secure connectivity.
Of course,
all employees should only be connected via a VPN, but planning for those cases
in which this is not possible - for example problems with end devices, a
damaged hardware token, etc. - must not be neglected.
However,
many companies are also faced with employees doing work on their own devices. Depending
on your company's MDM (Mobile Device Management) guidelines and the
availability of thin clients, VM and other technologies, this practice
represents both an opportunity and a risk. Inconsistent, outdated or faulty
hardware and software add to the complexity .
Remotely Update, Patch, and Incident Response
Working
remotely can make updating systems even more complex, as administrators are
physically removed from users, their systems, and the backend infrastructure. The
convenient solution of simply setting up a user's broken laptop at his
workplace with a system image no longer exists. Processing
security-related incidents to a large extent from home - while the users are
also at home - poses a number of special challenges.
Caller ID
Fake call
center support scams, widespread for over a decade, are likely to increase, and
users are likely to be more vulnerable when they are under stress. It is
critical that users verify callers - especially in the event of a link failure
that prevents access to corporate directory services or help pages.
This
brings with it another problem area: Should secure and secured communication
channels fail or prove to be inadequate, users will be tempted to supplement
them with alternative public services that the security team cannot oversee. This,
too, emphasizes the importance of identity verification.
Some of
these challenges can be improved at the first point of failure - the workplace
- through the use of surveillance, telemetry and detection tools in each
workplace. By installing forensic and response tools, devices can be
remotely scanned and isolated if necessary.
As
organizations and companies adapt to the decentralized work environment over
the next few days and weeks - if not months - new complications and unforeseen
consequences will inevitably arise. Microsoft team downtime over the past
few days is one example of this, and there will no doubt be many more. Ensuring
that devices, systems, and people are prepared for this type of disruption in
the midst of an even greater disruption will remain a major challenge.
What did we fail to
mention in this short blog post? What would you add to the list? Do
give your feedback in the comments below and stay tuned with more information
from us on this matter.
Using security antivirus like total security software is very important for protection while employees working from home.
Comments
Post a Comment