Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

10/8/2020
10:00 AM
Kurt John
Kurt John
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Key Considerations & Best Practices for Establishing a Secure Remote Workforce

Cybersecurity is challenging but not paralyzing, and now is the moment to educate our employees to overcome these challenges.

As is well known by now, the COVID-19 pandemic forced companies to reposition their workforces nearly overnight. And with roughly 40% of Americans shifting to remote work, it didn't take long for the sophistication and frequency of cyberattacks to increase. With flexible work environments here to stay and bad actors provided with new opportunities for preying on a vulnerable workforce, enterprises must educate employees to effectively manage evolving cybersecurity threats without sacrificing business agility.

Related Content:

Since Remote Work Isn't Going Away, Security Should Be the Focus

State of Endpoint Security: How Enterprises Are Managing Endpoint Security Threats

New on The Edge: RASP 101: Staying Safe With Runtime Application Self-Protection

Below are considerations derived from several key principles highlighted by the global alliance known as "The Charter of Trust," of which Siemens is a founding member. These steps are aimed at protecting businesses of varying sizes and include considerations ranging from employee best practices to basic criteria for hardware selection.

Where to Begin
A robust cybersecurity strategy relies on three pillars focused on establishing digital resiliency:

  1. Comprehensive, yet flexible, foundational policies that support the intersection of business objectives and information protection.

  2. An informed and vigilant workforce that can identify risks and react accordingly.

  3. Risk management solutions that address the evolving threat landscape.

Beginning with foundational cybersecurity hygiene, critical factors to drive digital resiliency include:

  1. Ensuring that employees, the first line of defense, are aware of all available information security resources. Workforce education and empowerment is critical, as it provides employees with the capacity not only to protect their own data but also to serve as the "Human Sensor Network" capable of helping spot suspicious activities.

  2. In the era of remote work, companies need to be more intentional about facilitating employees' understanding of — and engagement with — cybersecurity. Company communication channels are effective tools that should be leveraged frequently to activate on this.

    Ensuring that all company devices are enabled to automatically receive and apply critical software updates/patches without needing to be on the corporate network, empowering remote employees to minimize steps when maintaining digital integrity.
     
  3. Leveraging multifactor authentication (MFA) for all user accounts to provide an added layer of data protection.

"Work from Anywhere" Security
As employees choose to continue to work remotely, security vulnerabilities will persist. To better secure their workforces, enterprises must ensure that employees engage in good cyber-hygiene practices, such as the utilization of strong Wi-Fi encryption and complex passwords. Beyond this, organizations must also consider enacting significant changes to the way they approach data security.

For example, while corporate-issued virtual private networks (VPNs) are useful for securing company data in transit, they can sometimes lock an organization into a rigid configuration that doesn't always lend itself to the ever-evolving technology landscape. And with the pandemic accelerating digitization, we know that technology landscapes will continue to shift. Due to this, organizations should invest in flexible architecture, like zero trust — a broad term denoting a collection of technologies that facilitate the confirmation of users' identities as they traverse corporate resources.

Organizations should consider multiple solutions for authentication so that employees have flexibility based on a variety of scenarios they may experience in their day-to-day, such as second-factor authentication mechanisms, which include text messaging, hardware-issued cards, and mobile applications.  

Organizations should also think carefully about their policies pertaining to employees' personal devices — something that used to be off limits. Now that corporate devices are sharing private networks with potentially insecure devices, it is imperative that employees are provided with guidance and, where necessary, tools to help better bolster security.

In the age of the Internet of Things and connected devices, this is even more relevant than ever before. For example, an unpatched connected washing machine, stove, or thermostat can provide entry points for hackers. Similarly, voice-controlled smart speakers and other connected devices that have the capability to record audio and/or video may pose an eavesdropping risk.

Employees should be encouraged to remove or turn off smart devices and cover webcams when possible to ensure sensitive recordings do not fall into the wrong hands.

The Human Sensor Network
A constant priority for businesses should be continuing to empower employees to be deputized security team members, who can help to proactively identify potential threats and vulnerabilities in real time.

To empower this "Human Sensor Network," employees should be provided with an overview of best practices in confirming email addresses and legitimizing email requests for sensitive information. For example, a reporting protocol can be created for employees to help them report such potentially dangerous requests to create a security ecosystem amongst staff.

Lastly, employees should be consistently encouraged to always be on the defensive — this will help with mitigating unnecessary risks.

Future Opportunities
While these new challenges have arisen unexpectedly and almost instantaneously, if addressed correctly, we can all work together to protect ourselves moving forward. Cybersecurity is challenging but not paralyzing, and it's the right moment to educate our employees while facing these challenges. As cybersecurity remains a critical issue for both the private and public sectors, open lines of communications internally and externally will help improve our collective digital resilience, yielding a safer digital environment for all.

Kurt John is the Chief Cybersecurity Officer of Siemens USA, where he is responsible for the Cybersecurity strategy, governance and implementation for the company's largest market -- ~$23B in annual revenues. In this role, Kurt oversees the coordination of cybersecurity for ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/27/2020
Chinese Attackers' Favorite Flaws Prove Global Threats, Research Shows
Kelly Sheridan, Staff Editor, Dark Reading,  10/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25516
PUBLISHED: 2020-10-29
WSO2 Enterprise Integrator 6.6.0 or earlier contains a stored cross-site scripting (XSS) vulnerability in BPMN explorer tasks.
CVE-2020-27652
PUBLISHED: 2020-10-29
Algorithm downgrade vulnerability in QuickConnect in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors.
CVE-2020-27653
PUBLISHED: 2020-10-29
Algorithm downgrade vulnerability in QuickConnect in Synology Router Manager (SRM) before 1.2.4-8081 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors.
CVE-2020-27654
PUBLISHED: 2020-10-29
Improper access control vulnerability in lbd in Synology Router Manager (SRM) before 1.2.4-8081 allows remote attackers to execute arbitrary commands via port (1) 7786/tcp or (2) 7787/tcp.
CVE-2020-27655
PUBLISHED: 2020-10-29
Improper access control vulnerability in Synology Router Manager (SRM) before 1.2.4-8081 allows remote attackers to access restricted resources via inbound QuickConnect traffic.