NCET Biz Tips: WFH Network Risks to Your Business
by Antonio A. Rucci, retired Counterintelligence Special Agent and U.S. Army Warrant Officer
Businesses of all sizes are transitioning their workforces from their “Work-From-Home” (WFH) models, back to the physical office but many are opting to continue to allow their employees to work remotely, re-architecting their entire security strategy along the way. In doing so, unintended security risks are being introduced to business networks, and a simple VPN Connection isn’t the all-in-one solution.
Often overlooked is the importance of securing those remote devices and network segments beyond the employee’s machine themselves. Home networks become an extension of the business network, introducing a wide variety of risks to critical business internals, which are oftentimes outside the control or management of organizational IT. Some businesses provide company laptops and mobile devices for their employees to work remotely (Good Idea), while others opt to allow their employees to use their personal PC’s (Bad Idea). Either way, connections from within the user’s home network open unexpected back doors, increasing the attack surface to the user and the business network.
Here are a few tips that may help enhance your network security experience for remote and WFH employees:
Always Use Virtual Private Network (VPN) Connections.
Regardless of your business model, it’s important to secure external connections into your business network. End-to-end encryption provided by VPN connections is important to secure network traffic regardless if users are connecting to your internal network, their cloud instances, or external business resources.
Enable Multi-Factor Authentication (MFA) Whenever Possible.
Implementing MFA will add to the complexity of your authentication process however, the benefits gained from the increased security that these layers provide, as well as the fact that doing so will satisfy many compliance requirements and minimizing account takeovers and tool hijacking.
Lock Down Your Network Appliances (We Aren’t Talking About Refrigerators!)
Remove those Factory-Default Accounts and Passwords. This is the “Low Hanging Fruit” and it’s extremely easy to perform a quick search for the default credentials for most devices, granting an attacker administrator access to your network!Be sure to disable unnecessary ports! Routers, Switches and Printers often ship from the factory with several remote access ports enabled “by-default” to enable configuration and administration allowing ANYONE to access them until they are closed down and secured. Ports such as 21, 22 and 23 are often forgotten and left unsecured.
Build a Resilient (3-2-1) Backup and Recovery Strategy (The Most Important of All!)
A 3-2-1 Strategy is disciplined, reliable, and cost-effective method of backing up your critical information. Three Total Copies of your critical data, but on different mediums. The 1st is a local backup to a server or PC. The 2nd is backed up to an external or removable hard drive, then disconnected. The 3rd is backed up to an online or cloud service. It’s important to practice recovering your data periodically to build confidence in your or your IT Team’s confidence to do so.
I know we’re only scratching the surface here, but I will expand on these and other risks during the upcoming Biz Café. Please join me!
Learn about how to mitigate the WFH network risks to your business at NCET’s online Biz Cafe on at 3 pm on July 8, 2020. NCET is a member-supported nonprofit organization that produces educational and networking events to help people explore business and technology. Find more info at www.NCETcafe.org
Antonio A. Rucci is a retired Counterintelligence Special Agent and U.S. Army Warrant Officer who runs a private CyberSecurity Consulting Firm in Knoxville, TN performing Penetration Testing, Passive Network Assessments and Incident Response Professional Services to both private government and commercial entities throughout the country.
Vivamus mollis sed arcu at consequat. Fusce ut massa quis diam dignissim ornare at a arcu. In posuere porta massa, eget maximus sem feugiat eu. Nulla facilisi. Pellentesque sit amet semper mi. Praesent ac porttitor nunc, eu rutrum ligula. Praesent tincidunt justo vel laoreet imperdiet. Pellentesque viverra bibendum facilisis. Suspendisse purus ante, volutpat id aliquet tristique, iaculis vitae justo. Nulla posuere orci in ante vehicula accumsan. In sed nulla ipsum. Integer aliquam purus nec elit luctus vulputate.