Cyber security and remote working
Steven Bishop
As more people across the world turn to home working in an effort to combat the spread of the coronavirus, Steven Bishop offers his thoughts on the potential data concerns and cyber security consequences of providing employees remote access to IT systems.
Note: This article is presented as an introductory educational guide that aims to highlight some of the main issues that someone new to the subject needs to consider. It is not intended to be a comprehensive briefing and is not a substitute for an in-depth investigation into the wider issues.
We have a rush on at the moment in the world of IT services. Right now, there is an urgent need for many companies to setup remote working for their staff so that they can continue their day-to-day business operations in the face of calls for medical isolation and advice to restrict movement of people around the country.
Some big changes have to be made to the company’s operating procedures to accommodate remote working. New rules have to be quickly drafted and approved by the organisation’s management team. And in this rush, many safeguards are likely to be missed, overlooked or downplayed. If the organisation is inexperienced with IT systems then the management team needs to be aware of the significant and new risks that remote working opens up.
A big part of business-related IT management is putting in place appropriate controls and barrier-fences to reduce or eliminate IT operations that could permit data-leakage of confidential data and cause a breach of data-protection legislation such as GDPR.
As IT engineers, it is our job to facilitate the wishes of our customers, but it is also to inform and advise them that changes to their IT systems to add Remote-Working is going to open up some new and significant risks.
And, as knowledgeable technicians, we have to impress upon the customer that they need to carefully assess and consider these risks before they make their decision about who and how many employees are given the option to work remotely.
1: Remote working and data leakage
The first of the major headline risks of Remote-Working is an increased risk of data leakage.
The ‘off-the-shelf’ remote working tools that most customers will adopt will (by default) side-step most of the internal IT controls that normally prevent data loss. Out-of-the-box, they will permit Remote printer-sharing, remote desktop file-sharing, and remote USB connections, and each of these can be used to side-step the normal IT controls in place for data-protection.
When employees works remotely they are stepping outside of the normal day-to-day office environment, which itself prevents a lot of risky IT behaviour. In the office, employees are going to be observed doing something unwise, such as bringing in an external USB drive and connecting it to an office computer, or adding another printer to the office network and printing off a lot of company documents.
It doesn’t matter whether the motivation is a benign desire to simply achieve a task more quickly or whether it is malicious with a wish to steal company data. The end result is the same, with a big chance of data-leakage and a significant danger of breaching GDPR legislation.
2: Remote working and data connectivity
The second major headline is data connectivity.
Remote working stretches internet connectivity in new and strange ways. The standard business ‘broadband package’ that provides a customer’s office internet connectivity is unlikely to have enough capacity for anything more than a few remote working sessions to operate at the same time. It will typically have a far larger capacity for incoming data than for outgoing data, usually by a factor of five-to-one.
In normal circumstances this is fine, because on a normal working day most of the data traffic is entering the office rather than leaving it. Adding remote working access to an office IT system turns this on its head and stresses the weaker outgoing data capacity.
As a result, there needs to be a discussion with the customer to identify how many employees can comfortably use the remote working facility and to work out who are the priority users if the IT system becomes over-stretched.
If we don’t do this, then everyone will suffer a poor experience or find it so frustrating that they fail to make use of the system at all.
3: Remote working and cyber security
Remote working makes wide and open connections through the normal firewall defences of the office network.
At short notice, there may be a desire to let employees remotely connect to the office from their own personal computers at home. This is not an ideal situation as an employee’s personal computer is not under the management of the company, and may have malware or other malicious content hiding on it.
If the decision is made to use personal computers, then extra care needs to be taken, because there is a real chance of delivering ransomware into the office network and allowing company data to leak out.
Inevitably, any openings that we make to let authorised employees to gain access can sometimes be exploited by bad operators. If these remote working access routes are unmonitored or not well protected then the risk of a cyber-security break-in is significant.
4: Managing customer expectations
The simple phrase of ‘remote working’ covers a huge umbrella of technical issues and business operational risks.
The IT technician often ends up being the ‘kill-joy’ that has to explain this is more complicated than it first appears, and that it is not possible without extra expenditure and extra procedures to keep the company’s IT operations safe and secure.
There are a number of different ways to achieve remote working. Each company needs to assess their own level of risk, decide what is appropriate expenditure and what safeguards to put in place.
Doing something quick without the proper amount of consideration is risky and not advisable.
Steven has also produced his top 5 tips for IT security professionals to ensure employees can work remotely as securely as possible:
- Real-time active monitoring of data-traffic – ensure you are able to pull-the-plug the moment something untrustworthyis detected. Be paranoid, safety first.
- Have a proper disaster-recovery plan – you must, must, must have a reliable data backup of all valuable company data, and do a “fire-drill” to test that you can restore from it. Only this can save you in the event of a ransomware or other malware attack.
- Time-limit it – the longer that something is left up the more chance there is of a break-in. Don’t install it and then forget about it. Just look at the news headlines about Virgin-Media, British-Airways, Experian, etc, etc. Most of these were made far worse for being open and vulnerable for such a long time.
- Minimum number of people – only trusted people inside your organisation, those who can be trusted to keep a separate and clean PC to connect to the office network. You don’t, for example, want your kid installing a boot-leg game on your home PC and then infecting the office network from there.
- Proper IT partitioning – isolate as much as possible within the office network. Put up the IT equivalent of fire-breaks within the office network.
For those interested in further content on remote working, take a look at this wellbeing guide to working from home from our sister publications, SHP Online and Barbour EHS.
Free Download: The Video Surveillance Report 2021
Discover the latest developments in the rapidly-evolving video surveillance sector, directly from the people at its heart. We surveyed over 400 professionals working in the field to bring you the 2021 Video Surveillance Report. Responses come from installers and integrators to consultants and heads of security, as we explore the latest trends in the sector including video analytics; the use of surveillance outside of security operations; cloud-based storage solutions; integration; the impact of COVID-19; the market outlook and more!
Download for FREE to discover top industry insight around the latest innovations in network cameras and video surveillance systems.
Download The Video Surveillance Report
Related Topics
Avon fire crews resist plans to work as paramedics
Mitigating risks for travelling staff: Advice for the security department
Why are apprenticeships so important?
Subscribe
1 Comment
Inline Feedbacks
View all comments
June 10, 2021 12:28 pm
[…] Data and security considerations for remote working. […]
Reply
FAQs
What are security considerations for remote users examples? ›
- Managing All Devices and Employees.
- Insecure Passwords.
- Phishing Emails.
- Using Unsecured Personal Devices & Networks.
- Video Attacks.
- Weak Backup and Recovery Systems.
- Require employees to connect over VPNs.
- Install multi-factor authentication.
- Connect to a hotspot or use a VPN. ...
- Use strong passwords and a password manager. ...
- Keep work and personal separate. ...
- Stay alert for phishing or other attacks. ...
- Participate in routine cybersecurity training.
- Use antivirus and internet security software at home. ...
- Keep family members away from work devices. ...
- Invest in a sliding webcam cover. ...
- Use a VPN. ...
- Use a centralized storage solution. ...
- Secure your home Wi-Fi.
Typical Secure Remote Worker criteria
Secure access to the internet. Secure access to company and customer data. Secure access to communication tools. Secure access to collaboration and conferencing tools. Secure access to work applications.
- Lack of information. ...
- Password sharing. ...
- Software. ...
- Personal devices. ...
- Patching. ...
- Vulnerable backups. ...
- Device hygiene. ...
- Phishing attacks.
Included in this definition are three terms that are generally regarded as the high-level security objectives – integrity, availability, and confidentiality.
What are some ways to successfully and securely work from home? ›- Use antivirus software. ...
- Make sure your system and programs are up to date. ...
- Pay attention to Wi‑Fi and network security. ...
- Secure your privacy with a VPN. ...
- Avoid oversharing your screen. ...
- Beware phishing scams. ...
- Don't share personal information in messages or social media.
Encrypt sensitive information that you send to third parties over public networks (like the internet), and encrypt sensitive information that is stored on your computer network, laptops, or portable storage devices used by your employees. Consider also encrypting email transmissions within your business.
What is the largest threat to working remotely? ›- GDPR and remote working. Remote work means an employer has less control and visibility over employees' data security. ...
- Phishing Emails. ...
- Weak Passwords. ...
- Unsecured Home Devices. ...
- Unencrypted File Sharing. ...
- Open Home WiFi Networks.
Not only does cybersecurity training protect the company, but it also gives employees the knowledge needed to protect themselves inside and outside of the workplace. Identity theft is one of the most common cyber-attacks among remote workers.
What are the possible threats faced when people work online? ›
Internet-based threats expose people and computer systems to harm online. A broad scope of dangers fits into this category, including well-known threats like phishing and computer viruses. However, other threats, like offline data theft, can also be considered part of this group.
Which security challenges does the company face in supporting remote access for employees? ›- Reduced Security on BYOD and Mobile Devices. Cybersecurity is no longer just a challenge. ...
- Tracking and Managing Assets on the Cloud. ...
- Inadequate Backup and Recovery Systems. ...
- GDPR Compliance. ...
- Sensitizing Remote Teams to Actually Follow Data-Security Protocols.
- Manage your privacy settings. ...
- Remember: once posted, always posted. ...
- Build a positive online reputation. ...
- Keep personal info personal. ...
- Protect your computer. ...
- Know what action to take. ...
- Use strong passwords. ...
- Be cautious on social networking sites.
- Use strong passwords.
- Use Two-factor authentication.
- Update your software.
- Restrict access using firewalls.
- Enable Network Level Authentication.
- Limit users who can log in using Remote Desktop.
Use a reliable virtual private network (VPN)
By providing a VPN service to all staff and students where necessary, their online activities are the same as if they were sitting at school, the secured network. All traffic is encrypted and protected by the school's local network security measures.