📺 Stream EntrepreneurTV for Free 📺

Why Having a Secure Remote Environment Is More Critical Today Than Ever Before New threats emerge all the time. Here's how to stop them.

By Jennifer Spencer

entrepreneur daily

Opinions expressed by Entrepreneur contributors are their own.

pixelfit | Getty Images

Recent events have exposed a number of kinks in the armor of enterprise-level cybersecurity the world over. Suddenly, organizations that had invested billions in securing their networks and buildings are faced with threats from large-scale remote work. Firewalls, physical security and device management were effective when employees were at work, but not now.

Gene Yoo, CEO of Los Angeles-based cybersecurity firm Resecurity, says, "Remote administration channels are one of the key targets of compromise for threat actors... attacking businesses globally. Remote access is a "must-have' feature in today's COVID-19 era, providing significant benefits for enterprises of all sizes and ability to retain their employees and work processes... Besides cyber threats, the regime of working from home creates other risks — including insider threats as the employees become more easily accessible by targeted surveillance and espionage."

Related: 4 Tips for Keeping Your Data Secure While Everyone Works From Home

Less visibility on employees and your network perimeter

Employees working from home still need to access your network-hosted assets, but you will have significantly less visibility on both their activity and their end devices. Employees and their devices will likely use a variety of networks to access company data while working remotely.

When employees are working from home, they understandably have privacy concerns that need to be balanced with the need for secure computing. You may determine a need to monitor their devices, but that may be a breach of privacy, especially if they're personally owned. It's a fine line that each organization needs to figure out for themselves.

All of this remote work will also lead to less visibility on your network perimeters. With devices constantly connecting and disconnecting from the network, employing some sort of device management system to keep track of device health is critical.

Related: 5 Fundamental Best Practices for Enterprise Security

External threat monitoring and cyber forensics

More remote working means bad actors have a much larger attack surface. Instead of having to penetrate a robust and well-defended network perimeter, hackers can now target the much-less secure home networks of key employees.

Cyber forensics may also play a key role in remote computing environments going forward. This may involve outsourcing to trusted vendors to handle this complex task.

"It is crucial to have a trusted vendor who is able to supply businesses with meaningful external risk intelligence," Yoo says. "This significantly helps companies to make better decisions while maintaining awareness of a threat landscape that is constantly changing."

Insider threats

In a remote computing environment, though, it's relatively simple for unsuspecting employees to become bots for a hacker. Consider this: An employee is using a work computer on their home network and gets a convincing phishing email that installs some malware on their computer. This infected machine now accesses the corporate network and the malware spreads. Even the best-meaning employees, without proper cyber awareness training and a robust device management program, can quickly become unwitting insider threats.

"Targeted cyber-attacks focused on corporate VPNs are increasing," Yoo says. "Typically, threat actors attempt to compromise one or several employee accounts prior to an attack... Recently, several critical vulnerabilities were identified, related to VPN gateways and applications used for remote access." Advanced actors can use these as entrances to infrastructure.

Cyber espionage and control concerns

Remote work brings an increased risk of cyber espionage concerns, especially if your business doesn't have a good way to keep sensitive information secret. With employees accessing corporate data from home, it's likely they'll have sensitive information running through their home network, which is probably not secure.

As Yoo points out, "Cyber espionage groups and nation-state actors understand that employees of targeted companies are compromised while at home. They have a broad arsenal with which to target them, including non-cyber means." Since attackers usually start their attacks using widespread phishing campaigns, employing phishing exercises is a proven way to help increase employee awareness and thwart these attacks before they happen.

Related: 6 Cyber Threats You Can't Afford to Ignore

Widespread remote working is probably here to stay, which means keeping that computing environment secure is more important than ever. There has never been a more target-rich environment for bad actors, and every organization would do well to assess their new risks and take steps to secure their remote environment.

Jennifer Spencer

CEO of Energent Media

Jennifer Spencer is the founder of Energent Media, a digital marketing firm for tech startups. She is passionate about helping brands leverage content to share their stories with the world.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Editor's Pick

Growing a Business

The Only Way to Win Over Customers Is to Become Their First Choice. Here's How to Do It.

The best businesses focus their customer experience programs on doing the things that delight customers and put them ahead of their competition. Here are three little secrets to achieving this goal.

Business News

AI Is Transforming Drug Matching for Cancer, Rare Diseases — Here's How

One AI pharmaceutical startup works backward, starting from drugs already on the market.

Business News

A First-of-Its-Kind Flamethrower Robot Dog That Blasts 30-Foot Flames Is Now Available to the Public

Thermonator builds on existing technology — with a fiery twist. What could go wrong?

Business Solutions

Expand Your Business' Reach with This AI E-Book Generator for $25

Powered by intuitive AI, this tech enables you to easily create e-books that could generate income online.

Employee Experience & Recruiting

How Empathy-Based Leadership Can Transform Your Teams and Businesses

Empathy-based leadership is increasingly recognized as a valuable approach in the business world, where traditional strategic plans often fall short.