As organizations around the world quickly (and maybe haphazardly) retool their infrastructures to allow their employees to work from home (WFH) during this ongoing COVID-19 pandemic, hackers and bad actors have been relentless with their attacks on not only the key healthcare industry but other professional industries as well. Because of the heightened fear that has been brought about by the COVID-19 virus, hackers are working in overdrive to leverage this fear; crafting COVID-19 themed spam, ransomware and malware. These, new attacks, unfortunately, are having a greater success; taking advantage of workers who are no longer protected by the walled fortress security that their corporate environments offered as they work from home.
While many organizations look to increasing the amount of legacy VPN use in order to give their employees access to their corporate networks so they can do their jobs, as we’ve advised in previous blogs, there are huge security cracks showing. Legacy VPNs were just not built for scaling so that they could support millions of users nationally or globally. And that is the big issue. In a recent threat post article, “New research found that almost HALF of companies had malware on their corporate-associated home networks – in comparison to malware being found on only 13 percent of corporate networks.” Further, “home office networks are 3.5 times more likely than corporate networks to be infected by malware”. This does not bode well as the coronavirus forces organizations to shift their workers to WFH.
Where does this leave professional organizations such as law, accounting and consulting firms as they too have their employees WFH?
Unfortunately, as we see by recent news articles, these organizations are not immune and, if anything, are more focused targets of hackers since their computer systems and networks are loaded with confidential client information, accounting, financial information and other digital files that could severely hamper any work if they were inaccessible. One recent example of this came through CBC News, which reported that ransomware had locked two Manitoba law firms out of their computer systems. This “left lawyers and staff at the firms without access to client lists, emails, accounting and financial information, photos and other digital files. Cloud backups were also locked.” In this instance it was suspected that someone had clicked on a link or an attachment that had been infected with a virus and this virus then went on to infect the firms’ entire systems. Although paper records and court filings could be used to retrieve some of the locked data, since the lawyers usually work with a large amount of privileged and confidential information, it would be disastrous if this got into the wrong hands. If the firms refuse to pay the ransoms, the hackers could turn around and warn that if they aren’t paid, they could just leak the data; this could be devastating to the law firm, both from a reputational standpoint but also from a financial standpoint if the clients who were affected chose to sue the firms.
The same result as above can be felt in literally all professional firms. Accounting firms, should their data be breached and locked, could have their work ground to a halt if they are unable to access their clients’ accounting information in order to carry out client requests. Consulting firms, with huge amounts of client data on their computers and systems, could face a barrage of lawsuits if valuable corporate data were leaked. With employees from these firms in WFH mode, the networks and infrastructures of these organizations are at particular risk if they do not make sure that they have proper security solutions in place. Although many firms may believe that the legacy VPNs that are enabling their employees to access corporate data from home would be safe; because the employees’ WFH networks are inherently unsafe, it is opening up their corporate networks to easier attacks by determined hackers.
That’s where Wedge Networks can help. Using its years of experience providing orchestrated real-time security against all malware, Wedge has recently launched its Wedge Absolute Real-time Protection (WedgeARP) Secure Remote Office and Secure Home Office solutions to bring bullet-proof security to legacy VPNs and other remote office solutions. Utilizing the WedgeARP platform, it is a cloud-managed, on-premises or cloud-enforced security service offering that provides a vast array of optimized Security-as-a-Service features to organizations; enabling effective security solutions for any cloud-connected computing devices. Wedge’s solution provides real-time threat protection for all types of endpoints in different types of networks used by WFH and more (mobile data, 5G, SD-WAN, SASE and smart-city / IIoT). It further enables situational awareness for the entirety of managed networks, with security event tracing, rapid response, centralized policy management, reporting, and analytics; features that legacy VPNs just do not have.
With a proactive “Detect and Block” approach to security instead of the prevalent “Detect and Remediate” response approach, Wedge’s Secure Remote Office solution offers a preventative solution for these professional firms, and really ALL organizations, that are facing the need to ensure that their employees can be productive but SECURE in a WFH environment. By bringing security, normally seen in just the corporate network environment, to the home office environment, organizations can feel more secure in allowing their employees to access corporate data from home without having to fear that their corporate networks will be compromised.
To find out more about how WedgeARP Secure Remote Office and Secure Home Office solutions could benefit your organization, contact us at: info@wedgenetworks.com. For those organizations who already have a VPN infrastructure in place, WedgeARP can be easily deployed into their VPN Cloud to protect all connected systems and devices. For those organizations who have not yet implemented a VPN infrastructure, Wedge provides professional services to help quickly set up remote offices with Microsoft Azure vWAN, secured by WedgeARP. Don’t allow your organization to be at the mercy of the unrelenting hackers during this time. We have the solution for you and we’re here to help!
Main Website Links
Wedge DCI Search
Wedge Calendar
-
Recent Posts
- Wedge Networks Presents at the Canada Trade Mission to the Indonesia and Philippines
- Wedge Networks announces the general availability of WedgeARP v3.3
- vKey and Wedge: Protect and Extend Device Life in an Education Environment Webinar
- Wedge Networks Inc. Selected for Government of Canada Innovations Direct Buy Program
- Prevent the Rooting of Rootkits: The Critical Role of Real-time Threat Prevention
Recent Comments
- Ram Bathala on Calgary’s Wedge Networks Looks to Channel for Enterprise Push with Malware-Blocking Product
- Eva on Milliseconds Versus Minutes – The Difference Between Prevention and Remediation
- Smithb on Wedge Adds AI for Better Malware Blocking
- Abram on Wedge Joins MEF to Boost World’s Third Network Security
- David Millar on 5G & IoT Dominate MWC16
Archives
- December 2024
- November 2024
- June 2024
- March 2024
- February 2024
- December 2023
- October 2023
- June 2023
- May 2023
- February 2023
- January 2023
- November 2022
- September 2022
- August 2022
- July 2022
- June 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- September 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- October 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- March 2018
- February 2018
- July 2017
- June 2017
- May 2017
- April 2017
- February 2017
- November 2016
- October 2016
- September 2016
- May 2016
- April 2016
- March 2016
- February 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- June 2015
- May 2015
- April 2015
- March 2015
- December 2014
- November 2014
- October 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- April 2013
- November 2012
- October 2012
- September 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- June 2011
- May 2011
- February 2011
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
Categories
Meta
Kaspersky ThreatPost
- Student Loan Breach Exposes 2.5M Records August 31, 2022
- Watering Hole Attacks Push ScanBox Keylogger August 30, 2022
- Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms August 29, 2022
- Ransomware Attacks are on the Rise August 26, 2022
- Cybercriminals Are Selling Access to Chinese Surveillance Cameras August 25, 2022
- Twitter Whistleblower Complaint: The TL;DR Version August 24, 2022
- Firewall Bug Under Active Attack Triggers CISA Warning August 23, 2022
- Fake Reservation Links Prey on Weary Travelers August 22, 2022
- iPhone Users Urged to Update to Patch 2 Zero-Days August 19, 2022
- Google Patches Chrome’s Fifth Zero-Day of the Year August 18, 2022