Pathfynder
  • Home
  • Cyber Solutions
    • Risk Assessments
    • Threat Hunting
    • Insider Threat
    • Offensive Security
    • vCISO
  • Our Company
    • The Team
    • Careers
  • Blog
  • Contact

The Guide

THREE HARD TRUTHS FOR THE WORK-FROM-HOME CYBERSECURITY EXPERIENCE

9/9/2020

0 Comments

 
Justin Jackson - Director, Revenue Operations
​
Sometimes marketer. Aspiring analytics nerd. Donut lover.
Work from Home Cyber Threat
The Bottom-Line Up Front:  While the work from home advantage is clear for some businesses, leaders need to understand how this new reality impacts their cybersecurity posture. With that in mind, there are a few best practices to consider that will have an immediate positive impact on your company's security.

#1 Home and other Remote Setups can be a Mess

Sure, the use of VPNs, firewalls, and intrusion prevention systems might be standard architecture for WFH-to-corporate network connections, but how do you know they are working properly across all corners of this significantly larger operating environment? Worse, what if your employees' home networks are already infected with malware or connected to other compromised machines?
​ 
Without reliable endpoint security and user authentication in place, at best, IT might be "winging it" when it comes to mitigating these new vulnerabilities. At worst, cyber threats may already be roaming your network, having piggybacked their way in through your "secure" VPN. ​

#2 Home Devices Expand the Attack Surface

Perhaps you had a tight security policy in place for personal devices on-site, but does it account for large swaths of WFH employees using whatever device they chose for the workday? This reality complicates efforts to protect your company since every device is a potential network entry point for attackers.
​

Employees must understand that many mobile devices lack the security software that their work machines have. If mobile devices are necessary, then every effort should be made to adequately protect them.

Contractors and employees should also be made aware of the danger that open networks at public places like coffee shops and airports pose. It is easy to understand how WFH employees may seek out a change of work scenery since so many hours are spent at home, but the security risk these excursions introduce must be understood and mitigated to the greatest possible extent.

#3 Increased Threats from Insiders

If you operate in an industry where employees have access to sensitive customer data or company intellectual property that could be devastating if intentionally or unwittingly leaked, then an Insider Threat Program should be a key component of your cybersecurity strategy.

Establishing an effective Insider Threat Program is difficult when most employees are on-site. Unfortunately, the WFH norm makes it that much harder. WFH significantly degrades your ability to detect potential insider threats because a greater portion of the behavioral activities used to identify insiders no longer traverses corporate-controlled assets. For example, in a WFH scenario, if a user wants to browse the internet, they can disconnect from the VPN and have unrestricted and unmonitored access. 

Of course, these types of behaviors introduce gaps in your strategy and must be accounted for if you want to ensure your trade secrets are indeed protected. An Insider Threat program is still viable with WFH staff, but changes must be made to account for new behaviors
Picture

Tips for Improving WFH Security

We paint a stark picture only to emphasize the different risks posed by the new WFH norm.  Luckily, plenty can be done to mitigate the risks WFH presents. The key, as with anything security related, is to weed through the seemingly endless options and choose the ones that provide the biggest bang for your buck, given time and budget constraints.

With that in mind, below are a few best practices that companies should consider implementing:

Multi-factor Authentication (MFA).  One of the most cost effective, easiest to implement, and effective tools at your disposal. However, it is also one of the least used due to the minor inconvenience it imposes on your workforce.  Believe us, the return far exceeds the inconvenience.
​
Institute Proactive Defensive Measures.  Over a long enough time horizon, cyber adversaries will find a way to hack into your network, especially if you are not actively testing your exterior and interior defenses. Incorporating active defensive measures is one of the best and most cost-effective methods for increasing security.
  • Red Team Assessments. Routinely test the effectiveness of your defenses to gain a firm understanding of the damage an adversary can do. Conduct assessments periodically, targeting a mix of WFH and on-site users with different levels of access to identify and mitigate any weaknesses, and train your defensive teams to better identify and root out threats.
  • Threat Hunts. No matter how many security systems organizations put in place, adversaries continue to successfully breach networks. How damaging that breach is depends on how long it takes to identify and eliminate. Routine threat hunting enables organizations to more quickly identify and eliminate advanced threats that have evaded your network defenses.
  • Insider Threat Program. Companies with valuable data and intellectual property should not neglect the security threat posed by its employees and contractors. Establish an effective Insider Threat Program to mitigate the threats posed by accidental and malicious insiders.
 
Employee Training.  Train employees and contractors on basic security practices, including how to identify and report phishing attacks, along with the unique risks WFH poses such as use of public networks and personal devices.
 
Adapt Policies for the new WFH Paradigm.  Review current policies and update to account for the WFH reality. This includes use of personal devices, use of public networks, and physical security of devices, to name a few.

​Of course, not every company has the resources to have a full-time Chief Information Security Officer (CISO) to direct the strategies needed to safely work from home. In these instances, it might be worth looking to virtual CISO resources. This strategy provides expertise at fraction of the cost of an FTE, and can add tremendous value to your organization's security.
​
Regardless of what transpires with the COVID pandemic over the next several months, many companies have realized the benefit of allowing staff to work from home. Every company should think long and hard about the specific cyber risks a WFH norm poses, and implement appropriate controls to mitigate them.
Pathfynder is a service-disabled veteran-owned small business with offices in Washington, D.C and Bozeman, Montana. Shaped by decades of US military and intelligence community experience, we provide cybersecurity expertise and solutions trusted by small and medium-sized businesses as well as Fortune 50 companies.
CONTACT US
0 Comments



Leave a Reply.

    Archives

    December 2020
    September 2020
    August 2020
    July 2020
    May 2020
    April 2020

    Categories

    All
    Active Adversary
    BOLO
    Case Study
    Cyber Threat
    Emerging Threat
    Industrial Manufacturing
    Insider Threat
    Logistics
    Malware
    Offensive Cyber
    Penetration Tests
    Phishing
    Ransomware
    Risk Assessments
    Shipping
    Spoofing
    Threat Hunting
    Threat Intelligence
    Work From Home

    RSS Feed

Contact
Privacy Policy
Logo & Mark
EULA
Blog
Pathfynder 2020 | All Rights Reserved
  • Home
  • Cyber Solutions
    • Risk Assessments
    • Threat Hunting
    • Insider Threat
    • Offensive Security
    • vCISO
  • Our Company
    • The Team
    • Careers
  • Blog
  • Contact