fbpx

Enter your keyword

The Security Problem of John’s “Other” Laptop

The Security Problem of John’s “Other” Laptop

The Security Problem of John’s “Other” Laptop

How to Keep Your Business’s Data Ultra-Safe During the Work From Home Revolution

Working From Home gives employees freedom to work in a way that is more comfortable for them.

 

Love it or hate it, Working From Home is huge and here to stay.

As a nation, we’ve really embraced the changes forced upon us by the pandemic. Many businesses have become more flexible with a mixture of office-based workers, hybrid workers and fully remote workers.

We had no idea that we could change so much, so quickly, did we? Work just doesn’t look the same as it did in 2019.

And because of that, cyber security in 2022 doesn’t look the same either. When you have people working away from your office you need to take additional security measures to keep your data safe.

Even before we’d heard the word “Coronavirus”, many of us were working from home now and then. Checking emails at the weekend. Finishing up a project in the evening. Getting a head start on your week.

Now Working From Home has to be taken more seriously. If any of your staff works anywhere away from the office, there’s a chance they’re taking unnecessary risks with your data.

Many businesses seem to have this covered. They’ve invested in new company devices, increased remote security, and have trained their people on best practice.

But there’s something important some businesses haven’t considered.

Unmanaged devices.

We mean devices used to access business data that the company doesn’t know about.

Your company laptop and mobile are likely to be safe because they’ve been set up properly with managed security.

But what about other devices your team use for work? John’s “other” laptop; the one he grabs sometimes in the evenings just to do his email.

Who else uses this personal home computer?

 

In fact, the risk is bigger than this. There’s a risk from virtually all other devices on your team’s home networks.

Their games consoles, other laptops, tablets, and phones. Most people have an entire household of gadgets connected to the network.

And almost all of them are at risk of being accessed by cyber criminals.

The bad guys will find a way.

The big thing we know about cyber criminals is that they’re very persistent. If they want in, they will keep going till they find a way. And sometimes, your team will make it too easy for them.

All a hacker needs to do is access one device on someone’s home network. Let’s say it’s a game console. Once they access the console it’s a waiting game. The hacker will be patient and watch the traffic on the network. It’s possible they’ll be able to learn enough from that to eventually spot a security hole with a work device.

Often, by the time someone’s noticed something’s wrong, it’s too late. The hacker may have gained access to the VPN – the Virtual Private Network that allows you to securely connect to the business’s data.

And that means they can potentially gain access to your business’s valuable data. They might make a copy and sell it on the dark web.

Or they might install malware, malicious software that can do damage and corrupt data.

Or the very worst case scenario is they launch a ransomware attack, where your data is encrypted and useless to you, unless you pay a huge ransom fee.

This is the scariest thing that can happen to your business’s data. You do not want to risk this.

Big OOPS.

 

What’s the solution?

The answer isn’t straightforward. Unless your business wants to take on the security responsibility of all of your staff’s home networks, and all of their devices too.

It’s just not realistic.

However, there are things you can do to lower your risk of an intruder getting into your business network via an unsecured home network. And it all comes down to a layered approach to security.

There are five things we recommend.

1.) Help your team secure their home routers

The router is the box that spreads the internet around the house. You might know it as the Wi-Fi box.

You can give every member of your team advice and direct support keeping their router secure.

Things like changing default admin passwords to randomly generated long passwords.

Making sure the router’s operating system, known as firmware, is always up-to-date.

And disabling remote access, so no-one can change anything in the router unless they are physically in the property.

You could create a policy to make it clear your team must follow standard security guidance for their home network if they want to Work From Home.

 

2.) Make sure your systems are monitored

Your IT support partner should be monitoring your systems. That doesn’t mean having a quick check that everything is working as it should be, and waiting for you to flag up any issues.

It means they should be constantly monitoring your network 24/7, looking for anything unusual that may cause an issue. And preventing problems from escalating.

Unfortunately, cyber criminals don’t work to our schedules. They certainly don’t work a 9-5 job. It’s more likely that they’ll make changes when they believe no-one is watching.

And they may launch an attack at three on a Sunday morning, to give them as much time as possible to do what they need to do. Your IT team needs to be ready.

 

3.) Reassess your VPN

Virtual Private Networks have been invaluable over the last couple of years. But while they’ve allowed remote access to your business network, the large-scale use of VPNs has created a higher risk of a data breach.

If a hacker breached a device using a VPN to get onto your network, it means they could have full access to everything… without needing to pass further security measures.

That’s scary.

An alternative option is to ditch the VPN and take a zero-trust approach.

This means the credentials of every device and person trying to access the network is challenged and must be confirmed.

If a hacker does gain access, they can only cause damage to the specific system they have accessed.

 

4.) Carry out a security audit

The best way to ensure your business is protected from this kind of attack is to get a security audit.

Take a look at the security you already have in place and identify what’s missing to keep your business as safe as possible, without getting in the way of everyday work.

If you’re working with an IT support provider, they should already have a fully detailed account of your security systems. It’s worth asking them what weak areas they have identified and your options for improving them.

An expert will be able to assess your business and the way your people work, and make suggestions on the security measures that will work best for you.

 

 5.) Trust a true partner to worry about this for you

Are you 100% happy with your current IT support provider?

Your technology strategy is too important to be trusted to a company you don’t have a true partnership with.

Get in touch and let’s have a short no obligation conversation about your business.

 

Ready to Get Started?

Fill in the details and we'll contact you about your business.
  • This field is for validation purposes and should be left unchanged.

Dropsuite:

Dropsuite is a cloud software platform enabling businesses and organizations globally to easily backup, recover and protect their important business information including emails, contacts, calendars and OneDrive/Sharepoint files. Compliant email backup and archive system with a 10-year retention policy.

Vade Secure:

Vade Secure is an AI-based email security solution to improve security for Office 365 and block advanced phishing, spear phishing, and advanced malware threats. Vade Secure analyzes emails, webpages, attachments, and images with machine learning and deep learning algorithms that are trained to detect behaviors and anomalies common to advanced email threats.

Office Protect:

Office Protect is a service that’s designed to help you secure your Microsoft 365 tenant. Using our powerful in-house security software, our analysts actively monitor for threats, investigate alerts, eliminate false positives, and provide guided response and remediation. Protects against account break-ins, data exfiltration, business email compromise, phishing, internal threats, lateral movement, ransomware, and attacks by nation states.

Dark Cubed:

Dark Cubed focuses on real-time monitoring, threat intelligence, predictive analytics, elegant dashboard, streamlined workflow, executive reporting and active blocking. This is another layer of security that integrates with the firewall.

ThreatLocker:

ThreatLocker is a zero-trust endpoint security tool giving companies control over what software can run, by whom, and what data can be accessed.

It keeps a full detailed audit of what applications are used and data accessed/transferred/deleted and by what users (signature tracking, etc.) If something unusual happens, such as a signature change, or a user opens an application that is out of their normal routine the administrator is alerted. This is a crucial tool in identifying malware threats, as well as helping organizations identify if users are accessing applications and/or data/ files they should not be.

ThreatLocker provides a solution that allows businesses to control the content that runs on their network. Unlike AntiVirus software ThreatLocker is not looking for known viruses or malware. ThreatLocker uses a complex set of rules to determine what can be executed on a network and stops anything that has not been approved before it can even execute.

Huntress:

Huntress is a supplement to SentinelOne. Hackers are becoming more sophisticated, and Huntress actively seeks out these threat actors with a "defend forward" mentality. This software combines both advanced security tools along with human intervention to ensure even the most advanced hackers can't penetrate your network.

SentinelOne:

SentinelOne is a comprehensive enterprise security platform that provides threat detection, hunting, and response features that enable organizations to discover vulnerabilities and protect IT operations. SentinelOne integrates static artificial intelligence (AI) to provide real-time endpoint protection and reduce false positives that derail investigations or make threat detection a capital-intensive process. This will replace Webroot in your current environment.