This brings about increased risks, from a security point of view. Remote access security will help organisations to better protect their data and networks against threats and interception at both ends of the connection.
Are we facing an unprecedented pandemic, or will our fears be unfounded? It’s impossible to say right now, but global concerns over the current spread of coronavirus, and what will happen next with the outbreak is driving companies to review how their employees go about their daily tasks.
Millions of people across Asia have started working from home. Leading tech companies like Amazon, Microsoft, Facebook and other employers have asked their workforce to log in remotely until the situation improves and the virus is contained.
In light of all of this, enterprises such as JP Morgan have taken steps to test drive their remote working policies and infrastructure. This impending working paradigm shift means that every member of the workforce must prepare for the day when they are instructed to work from home.
Working from home is not complicated. Most of us do so now and again. Accessing an internet connection is easy enough, and cloud office suites and SaaS applications make it seamless to transition from working at the office to doing so on the couch in your living room. But most organisations will not have supported so many employees working remotely, and employees themselves may be a little out of practice in observing best practices when working from home.
So now is definitely the time to review and enhance security around remote access to corporate data, at both ends of the connection.
Here are tips for secure remote working for employees, and for their employers.
We naturally tend to be more relaxed at home, especially when it comes to security. After all, we’re in the safety of our own homes, so what could go wrong? Unfortunately, cyber-criminals are seeking to exploit exactly this sort of complacency with carefully-engineered phishing exploits and threats.
So employees should:
Remember that phishing schemes are a form of social engineering so if you receive an email with an unusual request, check the sender’s details carefully to make sure that you are communicating with colleagues, not criminals. Research teams have uncovered that domains related to coronavirus are 50% more likely to be malicious, so make sure to cast a critical eye over anything unexpected that pops into your mailbox.
This guide should serve as a starting point for organisations whether their apps and data are stored in data centres, public clouds or within SaaS applications.
You have to think ahead about how to handle the threats posed by data leakage, attacks propagating from a device into your network, and you need to ensure that the overall security posture of the devices is sufficient.
Make no assumptions about previous data management and take a granular approach which will serve you well once remote access is fully enabled. No one wants to accidentally provide the entire organisation with access to HR.
These cornerstones of remote access security will help organisations better protect their data and networks against threats and interception at both ends of the connection.