{"id":17878,"date":"2020-03-17T20:27:23","date_gmt":"2020-03-18T04:27:23","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2020\/03\/17\/news-11611\/"},"modified":"2020-03-17T20:27:23","modified_gmt":"2020-03-18T04:27:23","slug":"news-11611","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/03\/17\/news-11611\/","title":{"rendered":"Suddenly Teleworking, Securely"},"content":{"rendered":"<p><strong>Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Fri, 13 Mar 2020 15:58:12 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"270\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/03\/WFH-Securely-300x270.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/03\/WFH-Securely-300x270.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/03\/WFH-Securely-768x691.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/03\/WFH-Securely-640x576.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/03\/WFH-Securely-440x396.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/03\/WFH-Securely-380x342.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/03\/WFH-Securely.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>So you suddenly have a lot of staff working remotely. Telework is not new and a good percentage of the workforce already does so. But the companies who have a distributed workforce had time to plan for it, and to plan for it securely.<\/p>\n<p><strong>A Lot of New Teleworkers All At Once<\/strong><\/p>\n<p>This event can&#8217;t be treated like a quick rollout of an application: there are business, infrastructure, and customer security impacts. There will be an increase of work for help desks as new teleworkers wrestle with remote working.<\/p>\n<p>Additionally, don\u2019t compound the problem. There is advice circulating to reset all passwords for remote workers. This opens the door for increased social engineering to attempt to lure overworked help desk staff into doing password resets that don\u2019t comply with policy. Set expectations for staff that policy must be complied with, and to expect some delays while the help desk is overloaded.<\/p>\n<p>Business continuity issues will arise as limited planning for remote workers could max out VPN licenses, firewall capacity, and application timeouts as many people attempt to use the same apps through a narrower network pipe.<\/p>\n<p><strong>Help Staff Make A Secure Home Office<\/strong><\/p>\n<p>In the best of times, remote workers are often left to their own devices (pun intended) for securing their work at home experience. Home offices are already usually much less secure than corporate offices: weak routers, unmanaged PCs, and multiple users means home offices become an easier attack path into the enterprise.<\/p>\n<p>It doesn\u2019t make sense to have workers operate in a less secure environment in this context. Give them the necessary security tools and operational tools to do their business. Teleworkers, even with a company-issued device, are likely to work on multiple home devices. Make available enterprise licensed storage and sharing tools, so employees don\u2019t have to resort to \u2018sketchy\u2019 or weak options when they exceed the limits for free storage on Dropbox or related services.<\/p>\n<p>A Secure Web Gateway as a service is a useful option considering that teleworkers using a VPN will still likely be split tunneling (i.e. not going through corporate security devices when browsing to non-corporate sites, etc.), unlike when they are in the corporate office and all connections are sanitized. That is especially important in cases where a weak home router gets compromised and any exfiltration or other \u2018phone home\u2019 traffic from malware needs to be spotted.<\/p>\n<p>A simple way to get this information out to employees is to add remote working security tips to any regularly occurring executive outreach.<\/p>\n<p><strong>Operational Issues<\/strong><\/p>\n<p>With a large majority of businesses switching to a work-from-home model with less emphasis on in-person meetings, we also anticipate that malicious actors will start to impersonate digital tools, such as \u2018free\u2019 remote conferencing services and other cloud computing software.<\/p>\n<p>Having a policy on respecting telework privacy is a good preventative step to minimize the risk of this type of attack being successful. Remote workers may be concerned about their digital privacy when working from home, so any way to inform them about likely attack methods can help.<\/p>\n<p>Any steps to prevent staff trying to evade security measures out of a concern over privacy are likely a good investment.<\/p>\n<p><strong>Crisis Specific Risks<\/strong><\/p>\n<p>During any major event or crisis, socially engineered attacks and phishing will increase. Human engineering means using any lever to make it a little bit easier for targets to click on a link.<\/p>\n<p>We\u2019re seeing targeted email attacks taking advantage of this. Some will likely use tactics such as attachments named \u201cattached is your Work At Home Allowance Voucher,\u201d spoofed corporate guidelines, or HR documents.<\/p>\n<p>Sadly, we expect hospitals and local governments will see increased targeting by ransomware due the expectation that payouts are likelier during an emergency.<\/p>\n<p><strong>But Hang On \u2013 It Is Not All Bad News<\/strong><\/p>\n<p>The good news is that none of these attacks are\u00a0 new and we already have playbooks to defend against them. Give a reminder to all staff during this period to be more wary of phishing, but don\u2019t overly depend on user education \u2013 back it up with security technology measures. Here are a few ways to do that.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"10px\"><\/td>\n<td>\n<ul>\n<li>Give your remote workers the security and productivity tools they need to protect themselves and their non-corporate IT resources.<\/li>\n<li>Include an enterprise managed cloud storage account for work documents so employees don\u2019t find free versions that may not be safe.<\/li>\n<li>Enable customers and supply chain partners, who may also be teleworking, to interact with you securely.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/suddenly-teleworking-securely\/\">Suddenly Teleworking, Securely<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/suddenly-teleworking-securely\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Fri, 13 Mar 2020 15:58:12 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"270\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/03\/WFH-Securely-300x270.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/03\/WFH-Securely-300x270.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/03\/WFH-Securely-768x691.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/03\/WFH-Securely-640x576.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/03\/WFH-Securely-440x396.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/03\/WFH-Securely-380x342.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/03\/WFH-Securely.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>So you suddenly have a lot of staff working remotely. Telework is not new and a good percentage of the workforce already does so. But the companies who have a distributed workforce had time to plan for it, and to plan for it securely. A Lot of New Teleworkers All At Once This event can&#8217;t&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/suddenly-teleworking-securely\/\">Suddenly Teleworking, Securely<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,5897,24383,714,24384],"class_list":["post-17878","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-privacy","tag-remote-working","tag-security","tag-teleworking"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17878"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17878\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17878"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}