Remote Working Considerations

Remote Working Considerations

With the current pandemic situation, we all need to be taking remote working considerations. While adjusting the work paradym, it is vital to keep a mind's eye on the security and safety of the businesses information assets
Smiling young casual business man with mobile phone in the hand

Remote working considerations for the current pandemic situation. We all need to be taking remote working considerations. While adjusting the work paradigm, it is vital to keep a mind’s eye on the security and safety of the businesses information assets. We asked our CEO, Peter Bassill, what business leaders should be considering while they complete rapid deployment of remote working.

4 Remote Working Considerations

There are four things to really take into account. Remote working is often perceived as a security risk but done well; it is an enabler to a better business world.

Sensitive Data And Privacy

Sensitive Data and Privacy concerns are the two of the biggest nightmares of remote working considerations.

When enabling employees to work remotely, CISOs, IT Managers and business owners need to consider business exposure. You need to control the exposure of sensitive information flowing to the remote end user’s location. Staff perform many tasks and transactions, that data should never leave the traditional corporate perimeter.

For these situations, consider how to protect the data and the transaction itself. As a simple example, are you allowing data into a local spreadsheet via a VPN? Are users working on a sensitive spreadsheet in a browser via Office 365? May users be remotely accessing a desktop directly via a thin client in a browser? The last example here is the most secure since the data is only visibly available. It is never made locally available. While a low risk for web apps, other applications operating over a VPN can expose data outside of the authorised network. We need to consider how to enable remote employees and what datasets they are working.

Shadow IT*

In some businesses, employees have been instructed to work from home but not provided the proper tools. The reasons for this are varied. They include cost, lack of authority by geographic region or a lack of process.

Employees and even local IT staff are left to download remote access software of their choosing. They lack the monitoring, authentication and security alignment necessary to protect against an incident. If employees pick their tools, IT faces multiple remote access solutions and a growing mountain of IT problems that can be unmanageable.

Remote access is needed. What you need is a single scalable and secure tool suitable for the business. Many vendors are offering many months free to manage this crisis. If their solution works and meets the businesses requirement, it might be the right solution. After all, are all your employees going to return to the office once the pandemic has ceased?

Bring Your Own Device (BYOD)

Many businesses do not have enough assets to support remote employees. The ideal resolution for the company is for employees to use their own devices. Accessing systems with corporate-issued VPN or secure-remote-access technology. For many, this seems an unacceptable risk. With no traditional security controls like antivirus or vulnerability assessment on these devices, there is no way to mitigate the threats when they are connected and unmanaged. If other family members use these devices, the risk of malware infection increases exceptionally, especially when connecting to potentially sensitive data.

If BYOD is your only option, ensure your remote access solution does not do any protocol tunnelling and renders all remote sessions in a browser. Minimises the exposure of the corporate network further protects business assets.

Privileged Remote Access

Some employees are working work from home use privileged access. When they establish a remote session, the credentials they need to access and operate a resource are either administrative, root or a power user. Entering these credentials exposes them to the local computer, and any malware can sniff them out. Consider a remote access solution that permits credentials from a password safe or password vault. No credentials, especially the privileged passwords, should leave the organisation. Using a remote password safe or vault ensures this. It all helps to achieve that overall wrapper of safety and security.

More Information

If you would like more information on remote working considerations or information about the services Hedgehog can provide or you have any questions about this article, then please use the form below to get in touch.

[caldera_form id=”CF5e7f1635294b3″]

  • Recent Articles
Author Details
Founder & CEO at Hedgehog Security

Peter has been in the Information Security world since 1999 and in IT in general since 1996. His work history contains a unique blended balance between the development of exceptional technical capabilities and business knowledge. Peter is a proud father of twins and enjoys GT endurance racing on the weekends.

[caldera_form id=”CF5e7f1635294b3″]

  • Malware
    SB Tech Breach

    Last week saw SB Tech Breached by the hacking group Maze. It seems that every week the group are announcing more victims.  GameOn asked our CEO Peter Bassill, to give us some insight into the attack. The GameOn article is here.

  • Privacy
    Howto VPn

    In our “How to securely” series we asked our followers what tools they would like a simple guide on to help them stay secure online. There seemed to be a lot of confusion as to what a VPN is and why you should or should not use one. So we asked Peter to help.

  • WhatsApp
    How To Whatsapp Safely

    WhatsApp is among the fastest-growing instant messengers out there, and almost a social network in its own way. But if you are using it, there are some steps you should take to protect your security and privacy.

  • Morrisons Breach Update

    The UK’s highest court ruled that Morrisons can not be liable for a criminal act of a person seeking to harm their business. On April 1st, 2020, a panel of five justices unanimously ruled that Morrisons was not “vicariously liable”.

  • Remote Working Considerations

    With the current pandemic situation, we all need to be taking remote working considerations. While adjusting the work paradym, it is vital to keep a mind’s eye on the security and safety of the businesses information assets

  • Securing Zoom
    How To: Securing Zoom

    In this guide we are looking at how to go about securing zoom. Since the onset of the global pandemic, we have seen surge in “zoom bombing”. This is where people with malicious intent look for in-progress zoom meetings to join and cause trouble.

  • Software Security
    Dell EMC iDRAC memory corruption Vulnerability

    A critical vulnerabiltiy has been identified in Dell EMC iDRAC7, iDRAC8 and iDRAC9. Some unknown processing is affected by this issue. Manipulation with an unknown input can lead to stack based memory corruption.

  • Hiscox Sues for Failing to Disclose Data Breach

    On March 27th, Hiscox Insurance Company Inc. filed a complaint against law firm Warden Grier for concealing a data breach that occurred back in 2016.

  • Software Security
    Privilege escalation on Nginx Controller up to 3.1.x Controller API

    A critical vulnerability has been identified in Nginx Controller up to 3.1.x (web server,) affecting an unknown code block of the component Controller API.

  • Malware
    Chubb Cyber Ransomware Attack

    Chubb Cyber Ransomware Attack? Really? Well yes. It seem that, according the operations of Maze Ransomware, there really was a Chubb Cyber Ransomware Attack.

Share on facebook
Share on google
Share on twitter
Share on linkedin
Share on pinterest
Scroll to Top