Get All Access for $5/mo

Why Having a Secure Remote Environment Is More Critical Today Than Ever Before New threats emerge all the time. Here's how to stop them.

By Jennifer Spencer

Opinions expressed by Entrepreneur contributors are their own.

pixelfit | Getty Images

Recent events have exposed a number of kinks in the armor of enterprise-level cybersecurity the world over. Suddenly, organizations that had invested billions in securing their networks and buildings are faced with threats from large-scale remote work. Firewalls, physical security and device management were effective when employees were at work, but not now.

Gene Yoo, CEO of Los Angeles-based cybersecurity firm Resecurity, says, "Remote administration channels are one of the key targets of compromise for threat actors... attacking businesses globally. Remote access is a "must-have' feature in today's COVID-19 era, providing significant benefits for enterprises of all sizes and ability to retain their employees and work processes... Besides cyber threats, the regime of working from home creates other risks — including insider threats as the employees become more easily accessible by targeted surveillance and espionage."

Related: 4 Tips for Keeping Your Data Secure While Everyone Works From Home

Less visibility on employees and your network perimeter

Employees working from home still need to access your network-hosted assets, but you will have significantly less visibility on both their activity and their end devices. Employees and their devices will likely use a variety of networks to access company data while working remotely.

When employees are working from home, they understandably have privacy concerns that need to be balanced with the need for secure computing. You may determine a need to monitor their devices, but that may be a breach of privacy, especially if they're personally owned. It's a fine line that each organization needs to figure out for themselves.

All of this remote work will also lead to less visibility on your network perimeters. With devices constantly connecting and disconnecting from the network, employing some sort of device management system to keep track of device health is critical.

Related: 5 Fundamental Best Practices for Enterprise Security

External threat monitoring and cyber forensics

More remote working means bad actors have a much larger attack surface. Instead of having to penetrate a robust and well-defended network perimeter, hackers can now target the much-less secure home networks of key employees.

Cyber forensics may also play a key role in remote computing environments going forward. This may involve outsourcing to trusted vendors to handle this complex task.

"It is crucial to have a trusted vendor who is able to supply businesses with meaningful external risk intelligence," Yoo says. "This significantly helps companies to make better decisions while maintaining awareness of a threat landscape that is constantly changing."

Insider threats

In a remote computing environment, though, it's relatively simple for unsuspecting employees to become bots for a hacker. Consider this: An employee is using a work computer on their home network and gets a convincing phishing email that installs some malware on their computer. This infected machine now accesses the corporate network and the malware spreads. Even the best-meaning employees, without proper cyber awareness training and a robust device management program, can quickly become unwitting insider threats.

"Targeted cyber-attacks focused on corporate VPNs are increasing," Yoo says. "Typically, threat actors attempt to compromise one or several employee accounts prior to an attack... Recently, several critical vulnerabilities were identified, related to VPN gateways and applications used for remote access." Advanced actors can use these as entrances to infrastructure.

Cyber espionage and control concerns

Remote work brings an increased risk of cyber espionage concerns, especially if your business doesn't have a good way to keep sensitive information secret. With employees accessing corporate data from home, it's likely they'll have sensitive information running through their home network, which is probably not secure.

As Yoo points out, "Cyber espionage groups and nation-state actors understand that employees of targeted companies are compromised while at home. They have a broad arsenal with which to target them, including non-cyber means." Since attackers usually start their attacks using widespread phishing campaigns, employing phishing exercises is a proven way to help increase employee awareness and thwart these attacks before they happen.

Related: 6 Cyber Threats You Can't Afford to Ignore

Widespread remote working is probably here to stay, which means keeping that computing environment secure is more important than ever. There has never been a more target-rich environment for bad actors, and every organization would do well to assess their new risks and take steps to secure their remote environment.

Jennifer Spencer

CEO of Energent Media

Jennifer Spencer is the founder of Energent Media, a digital marketing firm for tech startups. She is passionate about helping brands leverage content to share their stories with the world.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Editor's Pick

Franchise 500 Annual Ranking

50 Franchise CMOs Who Are Changing the Game

Get to know the industry's most influential marketing power players.

Business Ideas

63 Small Business Ideas to Start in 2024

We put together a list of the best, most profitable small business ideas for entrepreneurs to pursue in 2024.

Living

70% of Small Business Owners Experience Monthly Burnout. Follow These 3 Rules to Avoid the Same Fate.

Here are three guidelines to help entrepreneurs achieve balance, growth and success in both their professional and personal endeavors.