Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/18/2020
10:00 AM
PJ Kirner
PJ Kirner
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Mitigating Cyber-Risk While We're (Still) Working from Home

One click is all it takes for confidential information to land in the wrong hands. The good news is that there are plenty of ways to teach preventative cybersecurity to remote workers.

Over the past few months, we've become very familiar with the many cybersecurity perils posed by a largely (or fully) remote workforce. It's clear that work-from-home (WFH) isn't going away anytime soon — and neither are bad actors.

Related Content:

VPNs: The Cyber Elephant in the Room

Special Report: Computing's New Normal, a Dark Reading Perspective

New on The Edge: Next-Gen Firewalls 101: Not Just a Buzzword

But as the fine line between working and living from home becomes increasingly blurred, it's important to step back and recognize that with everything interconnected, one click is all it takes for confidential information to land in the wrong hands.

The good news is there are plenty of ways to teach preventative cybersecurity — in your own home, at the dinner table — and a myriad of zero-trust tools you can leverage to keep yourself and your family cyber smart and secure while we WFH and go to school from home. Like anything else, practice makes perfect — and the same is true for cybersecurity. The better you can understand and practice the cybersecurity fundamentals within your own home, the safer off you and your loved ones will be.

Why Incidental Security Matters
Let's start with the basics. Every network, at home or work, sits behind network address translation (NAT) boxes that allow us to reuse RFC1918 private address spaces all over the world due to the scarcity of IPv4 addresses. NAT, often configured on enterprise firewalls or routers, provides some incidental security. For connections that need to originate from inside the corporate enterprise, it "accidentally" shields organizations from malicious Internet traffic coming in.

At home, most folks use a router provided by their Internet service provider. The home router has a firewall and NAT functionality so your family can safely connect out to your favorite websites, and those websites can send the data you asked for back to you.

However, with most employees now working at home, enterprise-grade firewalls at the edge of corporate networks are no longer protecting them or providing the needed visibility for IT to help keep the corporate users safe. That's where having an endpoint security solution that can provide visibility, segment and limit access between different internal networks and laptop devices can come in handy.

With CISOs, government employees, and business executives sharing home networks with their 15-year-old gamers and TikTok addicts, it's imperative to extend the principles of least privilege to the systems with important data inside the home network. Meaning that even if a bad actor gains access to your kid's network, your laptop and organization's internal assets stay in the clear. When it comes to proactively protecting against cyber threats, segmentation is one of the best ways to ensure that bad actors stay contained when they breach the perimeter. Because, let's be honest, it's bound to happen. And even if you don't click on something, your child might.

Understanding Your Zero-Trust Toolbox
We already touched on segmentation as a zero-trust tool, but there are many other tools you can use at home and at work (when we get back there) to ensure that your devices, networks, and crown jewels stay safe and secure.

According to our new report, 70% of organizations use multifactor authentication (MFA), topping the list of most popular zero-trust tools. It's a straightforward deployment (one you can use on your home devices via apps like Authy or Google Authenticator) and provides a valuable additional layer of security beyond just usernames and passwords. Similarly, 69% of security professionals use single sign-on (SSO) to sign in to their devices, enabling users to sign in once with strong credentials backed by MFA.

Other tools like segmentation can help extend the principles of "least privilege" to the end of your networks and assets, making it harder for bad actors (or well-intentioned kids) to break into and compromise your corporate devices.

Another way to keep cybersecurity top of mind in your home is to hold a "Security 101" lesson over your next family dinner to teach your family how to avoid malicious sites when downloading games, music, popular apps, or the personal information that can be unwittingly shared through social networks if you're not careful about what you share and with whom you connect. Hypervigilance, communication, and effective cybersecurity tools are key when it comes to keeping your family and your crown jewels safe and secure.

All in all, it's important to remember that you don't have to boil the ocean to mitigate cyber-risk in your home — especially with the challenges and tight budgets we face in COVID-19. It's important to be focused on actionable points and specific controls you can use to keep your families and data secure, whenever and wherever possible.

As chief technology officer and founder, PJ is responsible for Illumio's technology vision and platform architecture. PJ has 20 years of experience in engineering, with a focus on addressing the complexities of data centers. Prior to Illumio, PJ was CTO at Cymtec. He also ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
PhishProtection
50%
50%
PhishProtection,
User Rank: Apprentice
9/28/2020 | 4:30:17 AM
top phishing scams listed...
Agree with you 100%. Put out a phishing scams list on the top 10 ways hackers are using coronavirus to phish innocent users... here's the link.. https://www.phishprotection.com/blog/ten-ways-hackers-are-using-coronavirus-to-phish-you/

 
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29458
PUBLISHED: 2020-12-02
Textpattern CMS 4.6.2 allows CSRF via the prefs subsystem.
CVE-2020-29456
PUBLISHED: 2020-12-02
Multiple cross-site scripting (XSS) vulnerabilities in Papermerge before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the rename, tag, upload, or create folder function. The payload can be in a folder, a tag, or a document's filename. If email consumption is configured in ...
CVE-2020-5423
PUBLISHED: 2020-12-02
CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.
CVE-2020-29454
PUBLISHED: 2020-12-02
Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access.
CVE-2020-7199
PUBLISHED: 2020-12-02
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access,...