Posts

Why Wireless Security Protocols Won’t Protect Your Roaming Remote Workers

Whether it’s in a coffee shop, airport or crowded mall, wireless networks present a range of security risks not inherent in wired networks. Wireless access points (WAPs) and wireless routers broadcast data over the air in every direction. In hotspot environments where this traffic is unencrypted, any eavesdropping device within a limited range can easily pick off the signals and steal information.

The threat, while diminished, isn’t eliminated when WEP, WPA or WPA2 wireless encryption standards are employed to protect the data. WEP encryption can be cracked in minutes, and hackers have also compromised modern routers utilizing WPA and WPA2. Organizations can patch the vulnerabilities in their WPA and WPA2 protection, but the threat doesn’t end there.

Using readily available wireless sniffing devices such as the popular WiFi Pineapple, determined hackers can spoof the WiFi network as part of a man-in-the-middle attack to steal user credentials, insert malware, and compromise machines, whether the user is still in the café or has returned home or to a nearby office.

Outside the enterprise firewall, VPNs help with these mobile worker scenarios, but remote endpoint security relies heavily on the human element: What people do, what they don’t do. Even the best employee will temporarily disconnect from the corporate VPN to access the Internet directly, exacerbating the risk of infection from spyware, malicious sites or embedded files. Users go into coffee shops and airports and board trains and then bang away on their keyboards and do work. They make sustenance purchases. With the right level of caffeination, they can be rather productive in their contributions of digital and perhaps even audio- or video-delivered work. They’re focused on the job at hand, and they don’t want to be hassled by too many security steps in order to maintain a productive pace. You know the drill: Log into the VPN, complete two-factor authentication, and then, due to any extended human pause such as deep thought or bathroom break, you have to do it all over again just to resume your work.

In addition, wireless data encryption and VPNs, even when used, can’t stop shoulder surfing, and unattended machines are a big no-no since thumb-drive malware insertions can successfully be executed in seconds.

According to IDC research, more than 70% of breaches start at the endpoint. From there, a hacked employee, or a hacker or malware piloting the compromised device, might then use a “secure” tunnel to access your organization’s active directory, or a customer communication tool. Here, the compromised endpoint can lead to widescale network infection including the loss of data, network control, reputation and business.

Distributed Network Security Requires Endpoint Visibility

Do you know all the assets connecting to your network? The pathways they’re taking, the payload or suspicious behavioral tics or storms they’re carrying? Can you recognize immediately who is trying to connect to your network, using which app, on which device, and quickly authenticate identity, monitor and control for appropriate network usage?

Traditionally, on-device endpoint protection is managed sporadically and inconsistently, which is not an effective way to maintain a shrewd Zero Trust approach across your network. Ransomware, bots and malware have a way of morphing to get past static, outdated antivirus protection at the endpoints. In the majority of cases, especially when involving BYOD, the hardware drive isn’t encrypted and the VPN isn’t used. Exposure to ransomware threats increase outside the private network – for example, a largely unprotected mobile employee opening email or entering data into your network from a crowded restaurant or a public hotel. Intrusions such as spyware, password theft, and open-port assaults can all result from a malicious presence lurking, listening and entering from a nearby or remote location.

Do you really want an employee plugging his laptop into a public charging station at an airport and then reconnecting directly to your live conference, private network or datacenter without first orchestrating detection and authentication? Do you want to leave network pathways open so new worms, viruses, malware and other hacker schemes can spread? Firewall and VPN defenses are vulnerable to this lateral exploitation. Workers, whether mobile or in the office, as well as certain types of computing architectures, can inadvertently leave open windows for malware and file-less malware schemes such as social engineering ploys to spread deeper into the network. As if that’s not enough, denial-of-service (DoS) attacks are increasingly targeting prone remote users for an easy entry point (sometimes via another protocol known as Remote Desktop Protocol, or RDP) and they can then flood your network.

Advanced Always-On Endpoint Protection

You can’t rely on wireless security protocols, disciplined VPN use, and static antivirus protection to secure your remote workers as they run the gauntlet of cybersecurity threats outside your firewall. Your endpoint protection must be always-on, even when your people aren’t.

Through efficiencies in the cloud, OPAQ enables organizations of all sizes to bolster and continuously refresh remote security with:

  • Always-on end-user protection and advanced malware detection and prevention.
  • Strong authentication, including multi-factor and/or directory-based.
  • Encrypted communication over SSL or VPN, as well as on-device hard-drive encryption.
  • Suspicious activity alerts about what a company device has connected to.
  • Smart processes and safeguards before the device connects to your organization’s private networks, including a sensible screensaver timeout policy.
  • Microsegmentation, which provides additional layers of security against the spread of malware or unauthorized network control. Microsegmentation works by isolating workloads from one another and creating secure network zones that prevent infected hosts from connecting to each other or to the core network. It produces separate secure tunnels for users who are roaming and those who have been authenticated for more private network and data access. In the past, the cost and effort of network segmentation versus the risk of lateral infection was too much for many organizations to bear, but the cloud has enabled organizations to implement such advanced security controls more efficiently and cost-effectively.

Reinforce your security at the endpoints and reduce your attack surface with just a push. Apply smart, on-device security-as-a-service at the endpoint without compromising user experience or performance.

Learn more
Read the OPAQ Securing Remote Workers report.

Why Endpoint Security Is Crucial in Our ‘WAN Without Boundaries’ World

Networking: It’s not just about the physical communication structure you have to maintain. Networking is a way to grow your business, your brand, your market potential.

Leveraging the open Internet and social apps in the cloud can be more cost-effective than travel, face to face, and complete reliance on communication and collaboration over expensive private networks. However, employees are not always within the secure enterprise firewall/private WAN as they perform the functions of their jobs. Think electronic payment systems, for example, or public hot spots where the employee doesn’t first connect to your VPN. This venturing outside the perimeter leaves them – and potentially your entire company – exposed to hostile elements. Bad actors, someone or something that tries to deceive, steal or destroy, are lurking out there and trying to break in through the same Internet we’re using.

Your customers’ privacy, data, and finances are at risk, too. Data hosters and managed service providers are targeted regularly. When cracked, they lose their customers’ information and trust. The pilfered private information can be sold on the Dark Web, which is an anonymous realm where more than half of the web domains practice illicit activities.

A stateful firewall, one that inspects network traffic and packets, is not enough. Hackers, cybercriminals and AIs can successfully attack through deeply embedded, well concealed, or file-less schemes. In addition, firewalls are not good at stopping infections once a breach has occurred. You have to also be able to inspect credentials and network behavior so intruders are not able to cover their tracks, control your systems, and ruin your business and reputation.

Unfortunate Security Scenarios for Your Distributed Network and Workforce

So, realizing the threat, do you send teams out to all your branch offices for equipment reconfiguration? Maybe … But what do you do the next time, when the hackers start to exploit vulnerabilities in your soon-to-be legacy protection system? A lot can go wrong during this catch-up period.

  • Hackers, targeting easy prey, get in due to delays in applying a patch for remote access protocol. They borrow administrator privileges and create new phony accounts. It’s a deep hack. Your data, your customers’ data, has become theirs.
  • An employee in a small remote office, prone to email-driven social engineering ploys, gets infected. Any peer to peer communications from the employee’s machine can spread malware or misleading information to other users and systems.
  • Joe plugs his phone into a public charging station … or maybe he’s using a wireless network at a subway coffee shop where a sneaky neighboring device is monitoring traffic on the shared network. Oops. He forgot to log into the encrypted VPN before enjoying his espresso drink and clicking a digital link. Joe’s phone (the endpoint) thereafter starts acting suspiciously inside your own network, whether you can see this happening or not.
  • Poor Joe. In another scenario, he’s at an all-week conference and in the habit of leaving his laptop open and “on” in the hotel room when he’s not there. His system’s apps are still on, and the room’s visitor doesn’t even have to know Joe’s screensaver password. Just a little plug-in and the unauthorized person can fool your network into believing phony instructions from the endpoint are authentic.

Do you want to wait for the next truck roll to bolt on security against these very possible scenarios?

Why Remote Security Is Vital for Your Growth Strategy

Endpoint security is not just about token antivirus protection on mobile devices and a reliance on the user to log into your VPN. It’s about always-on protection wherever your employees go to do business, hence helping your organization to win in the aforementioned scenarios. You have to be able to inventory and secure all corporate-issued mobile computers and bring your own devices (BYODs) to ensure network performance and security. Doing this only at the network equipment level makes for a porous net in fighting crime at a wider network level. Instead, counterattack at the device level (phones, laptops, tablets), for these are the touchpoints roaming into the sometimes-hostile outside world.

Read the OPAQ report that stresses the criticality to:

  • Centralize team security by automatically inventorying remote and mobile endpoints inside a security-conscious dashboard.
  • Apply next-generation endpoint protection including strong authentication, encrypted communication, anti-virus management, anti-spyware, advanced malware filtering and protection, and microsegmentation.
  • Protect users with an always-on VPN that secures them while on the public Internet as well as while accessing private enterprise data, with separate clean corridors for each.

Read the Securing Remote Workers report.