Remote workstations are here to stay, but lax home network security is putting corporate networks at risk. Here are some steps to help secure your network and close the doors to a cyber breach.
You can get your copy of "8 Security Threats for Remote Workstations and How You Can Mitigate Your Risk," at:
https://eastatlanticsecurity.com/hackers-go-phish/
Why Remote Workstations Put You at Risk of a CyberBreach
Show Notes for Ssn 1 Ep 8
- Remote workstations pose specific risks and require additional security measures, staff training, and work-from-home protocols to keep the corporate network secure.
- Many companies have not yet set aside time and resources to set up secure workstations, company devices, and protocols for remote employees.
- Employees working remotely are more vulnerable to falling prey to phishing emails and other scams, potentially giving cybercriminals direct access to the corporate network.
What do employers need to do to secure their employees’ remote workstations and protect company data?
- Company Device
- When possible, a company-issued laptop is the safest workstation:
- A foundational caveat for using a company laptop: DO NOT USE FOR ANY PERSONAL USE.
- There are times when a personal device is being used at work, and those need special protocols.
- Public Wi-Fi
- All public Wi-Fi should be considered unsafe, and untrusted.
- We'll be covering this in-depth in Ssn 1 Ep 9: Spies at the Coffee Shop
- Accessing Company Resources and VPNs
- Users will probably need to access resources that are in their corporate offices.
- Employers have the ability to implement a sophisticated VPN from an untrusted workstation back to the corporate network, allowing that user access to specific resources from restricted channels.
- Passwords and Two-Factor Authentication
- Turn off autocomplete, and any saved passwords.
- Better solution: Use a password management app, like LastPass.
- Follow current industry recommendations for secure, unique passwords. (LastPass will generate secure passwords for you!)
- Enabling multi-factor authentication is an easy way to tighten security and should be used for all accounts.
- Check out Ep 5, Password Secrets and the Book of Codes for a deeper discussion of this topic.
- Firewalls
- Use firewalls for personal networks. Always have your provider firewall enabled, like Windows. Depending on how many devices you have on your home network, you should go even deeper than an anti-virus like Webroot.
- Don’t rely on your ISP access point or anything it provides. Go out and buy your own security device or firewall and plug it into theirs--and then keep it updated. Some recommendations:
-
- Sonicwall Tz105 UTM
- Cisco RV110W
- Ubiquity UniFi USG
- Get a hardware firewall hooked up that allows you to create virtual networks. Put your primary computer on one, and IOT devices on a separate network with no access to the computer in case an IOT device gets compromised.
- Listen to: Ep 4 IoT Devices and Network Security for more on this topic.
- Phishing emails
- Phishing is the #1 way of getting inside your network.
- Check out our back episodes on phishing, #2 and #3, and Ep 7: The Perimeter is Dead, for more information.
- Don’t open PDFs, Word docs, images, or any attachments that come in an email without first verifying with the sender.
- Beware of Bogus Websites, Apps
- Phishing emails and bogus websites centered around information about current events can crop up by the thousands (e.g. apps with global tracking maps during the pandemic containing spyware and malware.).
- Do not seek information from untrusted sources. Doing so can compromise your device and the company network.
- Personal Devices
- An employee’s personal device can be managed through a Bring Your Own Device policy
- Use a VPN when connecting remotely, or use Microsoft’s cloud offering.
- Best Practice: Use Microsoft Windows Virtual Desktop in the cloud.
- Using your personal phone or tablet to check work emails, files, etc. is a big NO when working from home.
- In the event an employee’s device is infected with malware, spyware, etc., Mobile Device Management sets up a "business space" and will keep that area separated and protected from the rest of the items on the device.
You hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/
Voiceover Artist: Paul Kadach at www.voices.com