WFH Is A Cybersecurity “Ticking Time Bomb”, Expert Weighs In

Free Services to help you during COVID-19 Learn More

Support Request a Demo Contact Us Blog
Business Data Breach

Expert(s): ISBuzz Staff | Informationsecuritybuzz.com »

BACKGROUND:

HP just released an HP Wolf Security report titled “Rebellions & Rejection”  in which 83% of IT Teams believe that working from home (WFH) has become a “Ticking Time Bomb”.  Report excerpts:

  • Firstly, the variety and scale of threats facing organizations has meant Cybersecurity teams have been working harder than ever to keep the business safe but are now feeling burned out.
  • Secondly, Cybersecurity teams have had to compromise security for business continuity, with many feeling like they’re in a catch-22 situation.
  • Thirdly, Cybersecurity teams have had to cope with workers pushing back on their eff orts to keep the business secure.
EXPERTS COMMENTS
Saryu Nayyar

| September 10, 2021

Saryu Nayyar, CEO, Gurucul

Eighteen months into the work from home era of the Covid-19 pandemic, many IT shops still don’t have a good handle on how to enact cybersecurity outside of the office. As a result, remote workers are actively bypassing standard security restrictions in an attempt to do their jobs, and in the process opening up security holes for exploit.

Corporate security professionals need a better understanding of how remote workers are doing their jobs so they can work collaboratively in designing cybersecurity systems that meet those needs. Monitoring activities in WFH environments and assessing the risk of specific activities should be a cornerstone of that effort..

 

| September 10, 2021

Garret F. Grajek, CEO, YouAttest

Every new access method, user pool and technology adds attack vectors and vulnerabilities to hackers. Given the zero warning of the COVID-19 pandemic, there was of course, errors and security flaws in most enterprises WFH strategy. We just saw that even the best WFH plans might be vulnerable w/ over 500k of Fortinet VPN users being exposed.

As with the other attack vectors, enterprises have to assume they will be breached and then ensure that rogue users access and actions are mitigated or limited. Key methodologies like Zero Trust must be implemented to ensure minimal lateral movement across the enterprise. This, coupled with reviews and alerts on the enterprise identities, is a crucial requirement to insure against WFH and other attacks.

Privilege escalation is usually the first course of action once a hacker gains hold of a user’s credentials and these escalations must be detected to maintain enterprise security.

 

| September 10, 2021

David Emm, Principal Security Researcher, Kaspersky

The findings reported by HP detailing employee pushback due to company cybersecurity policies is an interesting picture of the new challenges businesses face with workers and IT teams working remotely. One effect of employee frustration at corporate policies is to use their own equipment instead, which presents an immense risk to businesses by creating Shadow IT. With more than 90% of all cyber breaches being caused by human error, companies must have complete oversight of how their IT systems and hardware are being used by remote workforces. Without knowing what tech is potentially in contact with a business’s data systems, IT and cybersecurity teams have difficulty anticipating how the data belonging to a business can be potentially compromised, sold on, and even held for ransom.

Alarmingly, 46% of cybersecurity incidents last year were contributed to by staff lacking cybersecurity awareness and knowledge. This was primarily the result of social engineering and phishing scams, which trick individuals into compromising their own security. Cyberattacks based on scams like these are becoming more sophisticated at exploiting uninformed employees, especially those currently working in less secure remote working environments, and shadow IT only amplifies these threats. By hindering the visibility of an IT team, shadow IT diminishes their ability to provide advice and support on the potential threats as they occur – leaving employees and businesses vulnerable.

 

| September 10, 2021

Rajiv Pimplaskar, Vice President, Veridium

There has been a 72% increase in ransomware attacks since COVID19 that corresponds to the dramatic increase in work from home (WFH) and use of existing (and already infected) home computers. Bad actors can exploit such vulnerabilities and use key loggers and other MITM (Man In The Middle) attacks to appear like the legitimate corporate WFH user.

While enterprises and users are starting to adopt passwordless authentication methods like “phone as a token” and FIDO2 for customer and Single Sign On (SSO) portals and enterprise applications, vulnerabilities still exist across entire categories of cases such as, 3rd party sites, VPN (Virtual Private Network) and VDI (Virtual Desktop Infrastructure) environments, all of which are particularly vulnerable in the current WFH explosion.

Companies need to adopt a more holistic modern authentication strategy that is identity provider agnostic and can operate across all use cases in order to build true resiliency and ensure cyber defense against such actors.

Ticking Time Bomb

Ticking Time Bomb
External Link: WFH Is A Cybersecurity “Ticking Time Bomb”, Expert Weighs In

Share this page:

Related Posts