www.darkreading.com Open in urlscan Pro
2606:4700::6810:deab  Public Scan

URL: https://www.darkreading.com/endpoint-security/remote-works-hidden-dangers
Submission: On June 06 via api from TR — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Dark Reading is part of the Informa Tech Division of Informa PLC
Informa PLC|ABOUT US|INVESTOR RELATIONS|TALENT
This site is operated by a business or businesses owned by Informa PLC and all
copyright resides with them. Informa PLC's registered office is 5 Howick Place,
London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726.

Black Hat NewsOmdia Cybersecurity

Newsletter Sign-Up

Newsletter Sign-Up

Cybersecurity Topics

RELATED TOPICS

 * Application Security
 * Cybersecurity Careers
 * Cloud Security
 * Cyber Risk
 * Cyberattacks & Data Breaches
 * Cybersecurity Analytics
 * Cybersecurity Operations
 * Data Privacy
 * Endpoint Security
 * ICS/OT Security

 * Identity & Access Mgmt Security
 * Insider Threats
 * IoT
 * Mobile Security
 * Perimeter
 * Physical Security
 * Remote Workforce
 * Threat Intelligence
 * Vulnerabilities & Threats


World

RELATED TOPICS

 * DR Global

 * Middle East & Africa

See All
The Edge
DR Technology
Events

RELATED TOPICS

 * Upcoming Events
 * Podcasts

 * Webinars

SEE ALL
Resources

RELATED TOPICS

 * Library
 * Newsletters
 * Podcasts
 * Reports
 * Videos
 * Webinars
 * Whitepapers

 * 
 * 
 * 
 * 
 * Partner Perspectives:
 * > Microsoft

SEE ALL


 * Endpoint Security
 * Remote Workforce


REMOTE WORK'S HIDDEN DANGERS

Ten cybersecurity strategies for enterprises to keep remote work safer.

Victor Zyamzin, Chief Business Officer, Qrator Labs

June 5, 2024

6 Min Read
Source: Евгения Матвеец via Alamy Stock Photo


COMMENTARY

The COVID-19 pandemic dramatically reshaped the global work landscape — the
remote office has become the new norm. Employees are relishing a more flexible
schedule and extra hours of freedom, embracing a new quality of work-life
balance, while employers are appreciating the cost savings from ditching office
leases and other expenses. 

However, navigating the digital workspace from the couch comes with its own set
of threats: phishing scams that dress up as legit emails, ransomware that steals
private files hostage for money, and hackers listening in on Wi-Fi chats over
that not-so-secure home network. 



The foundation of a company's data security, whether it's being transferred or
stored, is a solid remote-access policy. This set of guidelines, usually
established by the company's IT or data security team, acts as a road map for
remote employees and their devices, ensuring safe access to company networks. 

It covers essentials like using a virtual private network (VPN) for secure
online navigation, installing anti-malware software on all employee devices, and
implementing multifactor authentication (MFA) to verify user identities. 



While developing a comprehensive remote access policy can seem daunting at
first, focusing on core security strategies helps build a flexible framework
tailored to your company's needs. Keep the approach straightforward — aim for
essential elements like access controls, data encryption, endpoint protection,
and user education. With sound foundational practices in place, you can then
customize policies as your business evolves. 




10 CYBERSECURITY STRATEGIES FOR REMOTE WORKERS


1. SECURE DATA IN TRANSIT

The primary goal of securing data in transit is to protect sensitive information
as it travels across networks from being intercepted by cybercriminals. This is
crucial for maintaining the confidentiality and integrity of corporate data,
personal information, and intellectual property.

This strategy employs encryption protocols such as SSL (Secure Sockets Layer)
and TLS (Transport Layer Security) to create a secure and encrypted channel
between two systems. Through the exchange of encryption keys, these protocols
ensure that data is encrypted before it is sent and can be decrypted only by the
recipient's device, rendering intercepted data unreadable to unauthorized
parties. 




2. PROTECT DATA AT REST

Encrypting data at rest aims to safeguard data stored on devices — especially
critical in scenarios of device loss or theft. This measure is fundamental for
protecting sensitive information and complying with various data protection
regulations.

Built-in encryption tools, such as BitLocker for Windows and FileVault for
macOS, encrypt the storage media of a device, such as hard drives, using strong
encryption algorithms. This process makes the data on these devices inaccessible
without the correct encryption key or user credentials, effectively securing the
data against unauthorized access, even if the physical security of the device is
breached. 


3. ADOPT IDENTITY AND ACCESS MANAGEMENT 

IAM systems are designed to control and monitor user access to company
resources, ensuring that employees have appropriate access levels based on their
job requirements. This is vital for preventing unauthorized access to sensitive
information and for the overall security of the company's digital environment.

IAM solutions like Okta or Microsoft Azure Active Directory provide centralized
management of user identities and permissions. They offer features such as
single sign-on (SSO), multifactor authentication (MFA), and automated
provisioning of user accounts. By managing digital identities, these
technologies ensure that only authorized users can access certain data and
applications, enhancing security and facilitating compliance with regulatory
requirements.




4. SECURE ENDPOINT PROTECTION FOR REMOTE EMPLOYEES

The aim is to protect endpoint devices (laptops, smartphones) used by remote
employees from malware, ransomware, and other cyber threats. Secure Web gateways
are also utilized to safeguard Internet access and prevent access to malicious
websites, enhancing overall cybersecurity posture.

This involves installing reputable antimalware and antivirus software on all
endpoint devices to detect and eliminate threats. Secure Web gateways further
protect users by filtering unwanted software/malware from Internet traffic,
ensuring safe browsing and Internet usage.


5. IMPLEMENT DDOS PROTECTION MEASURES

In an office environment, distributed denial-of-service (DDoS) attacks, which
overwhelm the network with excessive traffic, may result in minimal disruption.
However, for remote teams, a DDoS attack on the VPN can significantly affect
operations, crippling the ability to access critical corporate resources. 

To safeguard against these attacks, consider employing DDoS mitigation services
that can detect and filter out malicious traffic before it reaches the
network. [Editor's note: The author's company is one of many that offer such
services.]


6. DEPLOY GUARD AGAINST PHISHING AND ACCOUNT TAKEOVERS

This strategy focuses on minimizing the risk of phishing attacks and
unauthorized account access by educating employees on recognizing phishing
attempts and enforcing strong security measures like MFA.

Regular cybersecurity training sessions informing employees about the latest
phishing techniques and how to avoid them can reduce the risk of successful
attacks. Strong password policies and the enforcement of MFA add layers of
security, significantly reducing the risk of account takeovers.




7. UTILIZE USER BEHAVIOR ANALYTICS (UBA) AND ZERO-TRUST FRAMEWORK

UBA aims to detect anomalies in user behavior that may indicate a security
threat, such as compromised credentials or insider threats, by analyzing normal
activity patterns.

Tools like Splunk or Exabeam use machine learning to analyze user access
patterns and identify deviations from the norm. These anomalies are flagged for
further investigation.

The zero-trust framework operates on the principle of "never trust, always
verify," which requires verifying the identity of users and the integrity of
their devices before granting access to company resources. 


8. SECURE CLOUD SETTINGS AND MANAGE ACCESS

Correcting and securing cloud configurations is essential to protect against
breaches due to misconfigurations or vulnerabilities, especially with the
increased adoption of cloud services.

Regular audits and the use of cloud security tools from providers like AWS or
Azure help in identifying and rectifying insecure configurations. Effective user
access controls ensure that only authorized users or user groups can access
specific cloud resources, reducing the risk of data exposure.


9. IMPLEMENT REGULAR SOFTWARE UPDATES AND PATCH MANAGEMENT

Keeping software and systems up to date is important for protecting against
known vulnerabilities and exploits, which are frequently targeted by
cybercriminals.

Automated tools like WSUS (Windows Server Update Services) for Windows or Jamf
for macOS ensure that all devices in the network receive the latest security
patches and updates, closing off vulnerabilities and enhancing security.


10. INTRODUCE (OR UPDATE) INCIDENT RESPONSE PLANS

Having a robust incident response plan in place helps minimize damage during a
cybersecurity incident and facilitate a swift and organized recovery.

This involves regularly reviewing and testing the incident response plan through
simulated cyberattacks, then refining and updating it based on the insights
gained and lessons learned, ensuring preparedness for real-world incidents.




ONE MORE PIECE OF ADVICE 

If your company operates within the European Union (or processes the personal
data of individuals residing in the EU, regardless of location), then it's
crucial to check your compliance with the General Data Protection Regulation
(GDPR) — the comprehensive data privacy law that outlines the rules for managing
personal data and introducing potential fines for noncompliance. 




ABOUT THE AUTHOR(S)

Victor Zyamzin

Chief Business Officer, Qrator Labs

Victor Zyamzin is the chief business officer at Qrator Labs. Previously the
global head of business development in cybersecurity corporations and
international data center solutions companies, he has extensive experience
working with leading telecom, IT, and security brands, specializing in IT,
industrial cybersecurity, traffic monitoring and management, network security,
and critical infrastructure solutions.

See more from Victor Zyamzin
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities,
data breach information, and emerging trends. Delivered daily or weekly right to
your email inbox.

Subscribe

You May Also Like

--------------------------------------------------------------------------------

Endpoint Security

Chinese APT Developing Exploits to Defeat Already Patched Ivanti Users
Endpoint Security

More Ivanti VPN Zero-Days Fuel Attack Frenzy as Patches Finally Roll
Endpoint Security

How SME Leaders Can Make Cybersecurity a Strength in 2024
Endpoint Security

Securing Remote Workers Through Zero Trust
More Insights
Webinars

 * Assessing Software Supply Chain Risk
   
   June 6, 2024

 * Preventing Attackers From Wandering Through Your Enterprise Infrastructure
   
   June 19, 2024

 * Empowering Developers, Automating Security: The Future of AppSec
   
   June 27, 2024

More Webinars
Events

 * Black Hat USA - August 3-8 - Learn More
   
   August 3, 2024

More Events



EDITOR'S CHOICE

Person holding smartphone with logo Ticketmaster Entertainment Inc. on screen in
front of website.
Сloud Security
Ticketmaster Breach Showcases SaaS Data Security RisksTicketmaster Breach
Showcases SaaS Data Security Risks
byJai Vijayan, Contributing Writer
Jun 4, 2024
4 Min Read

Stressed-out looking man holds his head while looking at his laptop in despair
Vulnerabilities & Threats
NIST Commits to Plan to Resume NVD WorkNIST Commits to Plan to Resume NVD Work
byRobert Lemos, Contributing Writer
Jun 4, 2024
5 Min Read
A Paris 2024 Olympics flag on a flag pole
Threat Intelligence
Russia Aims Cyber Operations at Summer OlympicsRussia Aims Cyber Operations at
Summer Olympics
byNate Nelson, Contributing Writer
Jun 3, 2024
3 Min Read

Reports

 * Elastic named a Leader in The Forrester Wave™: Security Analytics Platforms,
   Q4 2022

 * 2023 Global Threat Report

 * EMA: AI at your fingertips: How Elastic AI Assistant simplifies cybersecurity

 * Zero-Trust Adoption Driven by Data Protection

 * How Enterprises Assess Their Cyber-Risk

More Reports
White Papers

 * How Cyber Threat Intelligence Empowers the C-Suite

 * 5 Essential Insights into Generative AI for Security Leaders

 * SecOps Checklist

 * A Short Primer on Container Scanning

 * Cisco Panoptica for Simplified Cloud-Native Application Security

More Whitepapers
Events

 * Black Hat USA - August 3-8 - Learn More
   
   August 3, 2024

More Events





DISCOVER MORE WITH INFORMA TECH

Black HatOmdia

WORKING WITH US

About UsAdvertiseReprints

JOIN US


Newsletter Sign-Up

FOLLOW US



Copyright © 2024 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

Home|Cookie Policy|Privacy|Terms of Use