Get All Access for $5/mo

Why Having a Secure Remote Environment Is More Critical Today Than Ever Before New threats emerge all the time. Here's how to stop them.

By Jennifer Spencer Edited by Heather Wilkerson

Opinions expressed by Entrepreneur contributors are their own.

pixelfit | Getty Images

Recent events have exposed a number of kinks in the armor of enterprise-level cybersecurity the world over. Suddenly, organizations that had invested billions in securing their networks and buildings are faced with threats from large-scale remote work. Firewalls, physical security and device management were effective when employees were at work, but not now.

Gene Yoo, CEO of Los Angeles-based cybersecurity firm Resecurity, says, "Remote administration channels are one of the key targets of compromise for threat actors... attacking businesses globally. Remote access is a "must-have' feature in today's COVID-19 era, providing significant benefits for enterprises of all sizes and ability to retain their employees and work processes... Besides cyber threats, the regime of working from home creates other risks — including insider threats as the employees become more easily accessible by targeted surveillance and espionage."

Related: 4 Tips for Keeping Your Data Secure While Everyone Works From Home

Less visibility on employees and your network perimeter

Employees working from home still need to access your network-hosted assets, but you will have significantly less visibility on both their activity and their end devices. Employees and their devices will likely use a variety of networks to access company data while working remotely.

When employees are working from home, they understandably have privacy concerns that need to be balanced with the need for secure computing. You may determine a need to monitor their devices, but that may be a breach of privacy, especially if they're personally owned. It's a fine line that each organization needs to figure out for themselves.

All of this remote work will also lead to less visibility on your network perimeters. With devices constantly connecting and disconnecting from the network, employing some sort of device management system to keep track of device health is critical.

Related: 5 Fundamental Best Practices for Enterprise Security

External threat monitoring and cyber forensics

More remote working means bad actors have a much larger attack surface. Instead of having to penetrate a robust and well-defended network perimeter, hackers can now target the much-less secure home networks of key employees.

Cyber forensics may also play a key role in remote computing environments going forward. This may involve outsourcing to trusted vendors to handle this complex task.

"It is crucial to have a trusted vendor who is able to supply businesses with meaningful external risk intelligence," Yoo says. "This significantly helps companies to make better decisions while maintaining awareness of a threat landscape that is constantly changing."

Insider threats

In a remote computing environment, though, it's relatively simple for unsuspecting employees to become bots for a hacker. Consider this: An employee is using a work computer on their home network and gets a convincing phishing email that installs some malware on their computer. This infected machine now accesses the corporate network and the malware spreads. Even the best-meaning employees, without proper cyber awareness training and a robust device management program, can quickly become unwitting insider threats.

"Targeted cyber-attacks focused on corporate VPNs are increasing," Yoo says. "Typically, threat actors attempt to compromise one or several employee accounts prior to an attack... Recently, several critical vulnerabilities were identified, related to VPN gateways and applications used for remote access." Advanced actors can use these as entrances to infrastructure.

Cyber espionage and control concerns

Remote work brings an increased risk of cyber espionage concerns, especially if your business doesn't have a good way to keep sensitive information secret. With employees accessing corporate data from home, it's likely they'll have sensitive information running through their home network, which is probably not secure.

As Yoo points out, "Cyber espionage groups and nation-state actors understand that employees of targeted companies are compromised while at home. They have a broad arsenal with which to target them, including non-cyber means." Since attackers usually start their attacks using widespread phishing campaigns, employing phishing exercises is a proven way to help increase employee awareness and thwart these attacks before they happen.

Related: 6 Cyber Threats You Can't Afford to Ignore

Widespread remote working is probably here to stay, which means keeping that computing environment secure is more important than ever. There has never been a more target-rich environment for bad actors, and every organization would do well to assess their new risks and take steps to secure their remote environment.

Jennifer Spencer

CEO of Energent Media

Jennifer Spencer is the founder of Energent Media, a digital marketing firm for tech startups. She is passionate about helping brands leverage content to share their stories with the world.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Editor's Pick

Business News

Apple Reportedly Isn't Paying OpenAI to Use ChatGPT in iPhones

The next big iPhone update brings ChatGPT directly to Apple devices.

Business News

Sony Pictures Entertainment Purchases Struggling, Cult-Favorite Movie Theater Chain

Alamo Drafthouse originally emerged from bankruptcy in June 2021.

Growing a Business

He Immigrated to the U.S. and Got a Job at McDonald's — Then His Aversion to Being 'Too Comfortable' Led to a Fast-Growing Company That's Hard to Miss

Voyo Popovic launched his moving and storage company in 2018 — and he's been innovating in the industry ever since.


Are Your Business's Local Listings Accurate and Up-to-Date? Here Are the Consequences You Could Face If Not.

Why accurate local listings are crucial for business success — and how to avoid the pitfalls of outdated information.

Business Ideas

63 Small Business Ideas to Start in 2024

We put together a list of the best, most profitable small business ideas for entrepreneurs to pursue in 2024.

Business News

'Passing By Wide Margins': Elon Musk Celebrates His 'Guaranteed Win' of the Highest Pay Package in U.S. Corporate History

Musk's Tesla pay package is almost 140 times higher than the annual pay of other high-performing CEOs.