Cybersecurity In-Depth: Getting answers to questions about IT security threats and best practices from trusted cybersecurity professionals and industry experts.

From the most accurate to the most practical, here are a few ways to ensure both employees and organizations are protected from risk.

John Bock, Senior Research Scientist

June 7, 2021

2 Min Read
router
(Image: Oleksandr Delyk via Adobe Stock)

Question: How can I test the security of my home-office employees' routers?

John Bock, senior research scientist, Optiv: This can be a challenging question because it depends on your user population and how creative your legal department wants to be. The technical answer is that enterprise vulnerability management products are capable of scanning home office routers, but before doing so you would have to account for several things — namely, some language employees could agree to stating they own their IP addresses to be scanned. They would need to give the organization permission to scan their routers and potentially cause disruptions. 

This would provide the most accurate results and integrated visibility into the organization's overall risk, especially if we're now treating the home office as an extension of the enterprise environment. But there are some dependencies in relying on employees to correctly supply their home router IP addresses. There are also potential downsides in terms of privacy issues and mishaps, like scanning an address by mistake. No matter what, the entire effort would have to start with the legal department. 

If that approach isn't practical, then you are left with what can be done with a typical user base that ranges across tech skill levels, including individuals who may have never logged into the management interface of their home routers. Starting with the most basic procedure, you can have users check to see whether their IP addresses are showing up in public databases. A quick way to do that would be: 

Now, most home users will have nonstatic addresses from their providers, but it's still worth knowing whether the addresses they are coming from is a problem. If you can ask employees to log in to their routers, then the highest priorities are having them update the firmware and validate their firewalls are enabled.

For technical users, this won't be a big deal, but it may be asking a lot for some of your user population. There's no simple way to handle this, but you can facilitate the process by offering links to vendor documentation on the specific actions you want a user to take and by making the help desk available for support. While the support team may not enjoy the increased load, it is worth the one-time resource hit in order to enable automatic updates along with ensuring basic protections are in place. 

About the Author(s)

John Bock

Senior Research Scientist

John Bock is senior research scientist at Optiv. Prior to this role, John was vice president of threat research, and before that he was the leader of Optiv's application security practice, which provided application pen testing and other software security services. With more than 15 years of application security and penetration testing experience, he is able to provide practical strategies for addressing security challenges and employing advanced capabilities to enable security assessment and defense.  Prior to joining Optiv, he held consulting and engineering positions at Casaba Security, Foundstone, and Internet Security Systems. He is also a contributing author and technical editor to multiple security publications, including the Hacking Exposed series.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights