WFH has now become the new norm across the globe as nations shut down borders, governments impose travel bans and group gathering restrictions, and organizations ask their employees to stay at home. As we’ve written in earlier blogs, the impact that this has had, especially on organizations who had not incorporated capabilities into their networks to allow their workers to access their servers from home, has been devastating in some instances. We’ve read that in some cases, workers are basically on paid vacations due to the fact that they are unable to access the work files they need while they are quarantined at home. Productivity has taken a massive hit and this does not bode well for the global economy as we all try to weather this global storm.
Because of this new reality, we are seeing a proliferation of tech articles providing advice and hints to organizations who now find the majority of their workforce working remotely. In a recent HelpNetSecurity article, several other cybersecurity implications are outlined that result from the shift from people working at the office to working from home. The biggest point brought up is that the shift to WFH greatly widens an organizations’ attack surface. Because many employees may use their own devices for work, it introduces new platforms and operating systems into the mix that require their own dedicated support and security; often which their companies are unable to adequately provide. As such, according to the article, “With so many devices being used, it’s likely that at least some will fall through the security cracks.” They, like other articles, also continue to bring up the thought that while workers are physically outside the walled fortress of their corporate networks while they work from home, they can no longer be protected.
To add to that, hackers and bad actors are relentless, utilizing the COVID-19 pandemic to step up their efforts to infect networks, sow chaos and line their pockets; stepping up attacks and hitting organizations when they’re down and unable to protect their workers in the growing WFH norm. Showing that they really have no sense of morality, hackers have stepped up their attacks on organizations that are being hardest hit right now during this crisis and that are the most in need by the public.
As highlighted by a recent Wired article, hackers continue to wreak havoc. For example, in the Czech Republic, Brno University Hospital was hit by ransomware and they have still not fully restored digital services. Unfortunately, ransomware on hospitals is the norm, as hackers bank on the urgent need for these organizations to function, especially in crisis situations such as now, that will push administrators to simply pay the ransom. These attacks can cause life and death situations in normal situations so in pandemic and crisis situations, it becomes orders in magnitude worse.
On top of that, the article goes on to say that it is not just monetary gain that hackers are looking for during this time. Some of the attacks are being carried out by nefarious nation-states looking to implant spyware in order to carry out surveillance operations and are taking the COVID-19 opportunity to carry out these plans. With the overall daily internet usage greatly increasing during this pandemic, more people are online and are thus seemingly at more risk.
So, what is the thought that both of the above articles seem to be getting at? They, and other articles that we’ve seen as of late, tend to lean on the idea that it is “impossible to completely secure employees working from home”. This is an unfortunately widespread fallacy that we would like to dispel. Although we understand that many organizations are having a tough enough time just trying to put in place infrastructure that will allow their employees to work from home, they don’t have to let cybersecurity fall by the wayside. With Wedge’s PlanV – Secure Remote Office Solution, organizations can be assured that their workers can actually be completely secured, even while working from home. Based on the Wedge Absolute Real-time Protection (WedgeARP) platform, real-time detection and blocking of all malware can still be provided to those not protected by the fortified corporate castle within the organization’s physical office.
PlanV offers some key benefits to organizations, including:
1. Allowing workers to access their workplace systems to achieve the same productivity while working from home.
2. Providing real-time threat protection for both the home office and corporate infrastructure.
3. Improving the economics of the WFH environment, lowering worker commute times, reducing bandwidth and office space costs and allowing for centrally managed security – blocking malware before it can even enter your network.
PlanV is both platform and OS agnostic so can provide protection to any and all connected devices; preventing any from falling through the security cracks. For those organizations who already have a VPN infrastructure, WedgeARP can be easily deployed into their VPN Cloud to protect all connected systems. For those organizations who have not yet implemented a VPN infrastructure, Wedge provides professional services to help quickly set up remote offices with Microsoft Azure vWAN, secured by WedgeARP. Contact us at: info@wedgenetworks.com to learn more. We’re here to help all those organizations facing difficulties as they move forward in this exploding WFH paradigm.
Main Website Links
Wedge DCI Search
Wedge Calendar
-
Recent Posts
- Wedge Networks Presents at the Canada Trade Mission to the Indonesia and Philippines
- Wedge Networks announces the general availability of WedgeARP v3.3
- vKey and Wedge: Protect and Extend Device Life in an Education Environment Webinar
- Wedge Networks Inc. Selected for Government of Canada Innovations Direct Buy Program
- Prevent the Rooting of Rootkits: The Critical Role of Real-time Threat Prevention
Recent Comments
- Ram Bathala on Calgary’s Wedge Networks Looks to Channel for Enterprise Push with Malware-Blocking Product
- Eva on Milliseconds Versus Minutes – The Difference Between Prevention and Remediation
- Smithb on Wedge Adds AI for Better Malware Blocking
- Abram on Wedge Joins MEF to Boost World’s Third Network Security
- David Millar on 5G & IoT Dominate MWC16
Archives
- December 2024
- November 2024
- June 2024
- March 2024
- February 2024
- December 2023
- October 2023
- June 2023
- May 2023
- February 2023
- January 2023
- November 2022
- September 2022
- August 2022
- July 2022
- June 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- September 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- October 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- March 2018
- February 2018
- July 2017
- June 2017
- May 2017
- April 2017
- February 2017
- November 2016
- October 2016
- September 2016
- May 2016
- April 2016
- March 2016
- February 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- June 2015
- May 2015
- April 2015
- March 2015
- December 2014
- November 2014
- October 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- April 2013
- November 2012
- October 2012
- September 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- June 2011
- May 2011
- February 2011
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
Categories
Meta
Kaspersky ThreatPost
- Student Loan Breach Exposes 2.5M Records August 31, 2022
- Watering Hole Attacks Push ScanBox Keylogger August 30, 2022
- Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms August 29, 2022
- Ransomware Attacks are on the Rise August 26, 2022
- Cybercriminals Are Selling Access to Chinese Surveillance Cameras August 25, 2022
- Twitter Whistleblower Complaint: The TL;DR Version August 24, 2022
- Firewall Bug Under Active Attack Triggers CISA Warning August 23, 2022
- Fake Reservation Links Prey on Weary Travelers August 22, 2022
- iPhone Users Urged to Update to Patch 2 Zero-Days August 19, 2022
- Google Patches Chrome’s Fifth Zero-Day of the Year August 18, 2022