Security misconfigurations and human error
You may be surprised to learn that a staggering 65% of cloud network security breaches are due to a simple case of user error. Misconfigurations are by far the most persistent human error issue, leading to everything from accidental compliance violations and unplanned outages, right through to leaving the door wide open for bad actors and malware. Some of the most common security misconfigurations include overly permissive access, such as giving employees at a lower security grade more access than they need to ‘cover them’ long-term; opening ports to known vulnerable hosts; creating rules that bypass the proxy and violating egress policies; and offering access to a zone, subnet or host where it’s not needed. Even prior to the pandemic, back in 2018, IBM revealed a startling 424% year-on-year increase in data breaches due to cloud misconfigurations caused by human error.
Security gating that’s based on users rather than devices
One statistic that’s guaranteed to send a shiver down the spines of CTOs and CISOs everywhere, is that more than a fifth of remote working employees report that their work devices are also used regularly by their family members. This is a common occurrence when security policies are based solely on devices rather than the users of those devices. It’s one thing to limit access to sensitive applications or data to one device, but if that device is being at home and is left logged in, anybody can access it. What’s more, staff may choose to log into their devices to give access to other members of their household, however this is more to do with staff training than it is with security configuration. Businesses are used to taking a ‘least privilege’ or zero-trust approach when it comes to giving devices access to their networks – they should take the same approach with humans.
Using the cloud to its fullest potential
Remote access, by its very nature, is less secure than on-site access. But that doesn’t have to be the case. Smart use of virtual private networks (VPNs) and remote desktop virtualization can give employees the in-house experience while they work remotely, both in terms of performance and security. Tooling up with VPNs and antivirus software will make even less secure channels like WhatsApp and Slack less exposed, keeping your sensitive data secure.
There are inherent risks associated with remote working, but with the right security policies, training and technologies in place these risks can be heavily mitigated. While some businesses might be looking at broadscale SD-WAN or SASE adoption, those that aren’t can still pave the way to a more resilient and sustainable future by embracing tools that are already at their disposal. We’re past the point where remote working can be regarded as temporary, so it’s time to evolve from temporary security fixes.
The post How to manage the security risk of remote working appeared first on Cybersecurity Insiders.
December 20, 2021 at 08:10PM
0 comments:
Post a Comment