Let Them Work From Home, But Don’t Leave Yourself Vulnerable

Let Them Work From Home, But Don’t Leave Yourself Vulnerable

If you’re like many organizations right now, you’ve probably embraced a work-from-home policy. Even as things start slowly returning to normalcy, many organizations — and especially employees — are choosing to remain within a remote work or hybrid framework. But are you implementing it securely? Enabling workers to access the systems and data they need from home can create a wide range of cyber risks that attackers can be quick to exploit. Here are some of the most critical vulnerabilities that enterprises of all sizes need to watch out for.

VPN Vulnerability

Organizations commonly use Virtual Private Networks (VPNs) to enable remote workers to access corporate applications and data. Your chosen VPN solution should be reviewed to ensure that it is hardened to prevent attackers from accessing your network and intercepting communications. This includes ensuring that VPN split-tunneling — used to reduce impact on bandwidth — is implemented as securely as possible.

Cloud Vulnerability

Flaws in the way that cloud platforms and software as a service (SaaS) applications such as Microsoft 365 and G Suite are set up could leave data and assets exposed. Your cloud and hybrid environments should be thoroughly inspected to identify risks and provide guidance to ensure workloads are hardened in line with the latest security best practices.

Access Management

To ensure remote workers are able to access the systems they need outside the office, many organizations relax security settings such as IP address whitelisting. Use of access management technologies such as cloud access security broker (CASB) and zero-trust network access (ZTNA) can help to reduce risk, but these tools aren’t always optimally configured. All-access controls should be reviewed to ensure that they are implemented securely and configured with the latest threats in mind.

BYOD

No alt text provided for this image

“Bring your own device” — or BYOD — is the practice of allowing employees to use their own devices to access company networks. Some organizations use remote access technologies, application containers and application wrapping to mitigate the associated risks, but these need to be implemented securely. Your organization’s BYOD policy and controls should be reviewed to help identify where and how improvements can be made.

Firewall Vulnerability

Firewall misconfigurations can provide an opportunity for an attacker to obtain easy access to a network, install malware, and conduct command-and-control activity. You should review your organization’s firewall settings to identify open ports and brush up on firewall policies to help ensure they adhere to the principle of “least privilege.”

RDP Vulnerability

Remote Desktop Protocol (RDP) is used by remote employees to connect to and access servers and other devices. It’s imperative to check that RDP is configured securely and free of vulnerabilities which could allow cybercriminals to remotely take over unpatched devices.

This list may seem like a lot of items to go over, but a proper assessment of each component is absolutely necessary. We understand that you’re trying to manage an organization and may not have the time or knowledge required to go through everything with a fine-tooth comb — especially now during a time that many businesses are struggling to keep up. Let V2 give you a remote work security assessment. It will take a lot off your plate and will ensure your organization’s security both during and after the pandemic.


Since 1995, Manassas Park, VA-based V2 Systems has employed local systems administrators, network engineers, security consultants, help desk technicians and partnering companies to meet a wide range of clients’ IT needs, from research, to implementation, to maintenance. Concentrate on your VISION…We’ll handle the TECHNOLOGY!

To view or add a comment, sign in

More articles by V2 Systems, Managed IT Services

Explore topics