Featured Product
This Week in Quality Digest Live
Management Features
Steven Stein
Four methods for performing a supplier evaluation, and how each method can be employed
Ryan E. Day
Climbing rates of cyberattacks intensify
Jason Chester
Exploring essentials to manufacturers’ present and future success
Harish Jose
A quest for ultimate efficiency
Chuck Olinger
Many requirements for quality management can be met through advanced ERP software

More Features

Management News
Morse has a long history with the center, both as a faculty researcher and for serving as the center's deputy director since 2010
Siemens introduces PCBflow, a secure, cloud-based solution for accelerating design-to-manufacturing handoff for printed circuit boards
Includes global overview and new additive manufacturing section
Tech aggravation can lead to issues with employee engagement, customer experience, and business results
Harnessing the forces that drive your organizations success
Free education source for global medical device community
New standard for safe generator use created by the industry’s own PGMA with the assistance of industry experts
Provides synchronization, compliance, traceability, and transparency within processes
Galileo’s Telescope describes how to measure success at the top of the organization, translate down to every level of supervision

More News

NordVPN Teams


How to Protect Remote Offices

Cyber attacks are up 400% compared to before Covid-19

Published: Wednesday, October 14, 2020 - 12:01

The FBI reported earlier this year that complaints of cyber attacks received by its cyber division had risen to almost 4,000 a day—a 400-percent increase over pre-coronavirus numbers. In one four-month period (January to April), 907,000 spam messages, 737 incidents related to malware, and 48,000 malicious URLs—all related to Covid-19—were also detected by one of INTERPOL’s private-sector partners.

Hardware-reliant, legacy, and even hybrid network infrastructures have suffered terribly from a lack of quick-fix solutions. These solutions are necessary to facilitate the exponential increase in remote “offices” that require adequate protection.

“One of the things that’s changed is that corporations no longer have control over the infrastructure their employees use for work,” says Juta Gurinaviciute, chief technology officer at NordVPN Teams.

Although no network is immune to attacks, a stable and efficient network security system is essential for protecting data.

“If your company took shortcuts to expand remote connectivity, you should prioritize access and access control assessments,” Gurinaviciute adds. “You should also assess the threats your remote workers may inadvertently be creating. If you have 5,000 employees, you now have 5,000 remote offices to protect. The bandwidth has increased dramatically, and there’s really no time to waste.”

Understand the landscape

Identify and limit the threats your business must face. Human error is difficult to mitigate, but network configurations, permission controls, and remote access setups can all be deployed in a way that limits the threats your remote teams face. This means things like figuring out which tools or resources need to be accessible remotely, or choosing solutions that secure network perimeters and allow for convenient access control.

Know your network and optimize accordingly. Network topology and architecture will influence remote work policies and security. Your company and its structure will influence these even more. Hardware-reliant or hybrid networks might need to implement site-to-site solutions for remote access. Cloud-based architectures might have it easier, but ensuring effective threat mitigation remains challenging. In any situation, credentialed access to corporate resources and powerful encryption is the way to go.

Secure your network

Choose your remote access solutions. If you had one office to secure, you may have been using an on-premises VPN. The problem when an entire workforce goes remote with this setup is the bandwidth often doesn’t suffice when employees all try to access remotely at the same time. If you have multiple offices to secure—which, in a way, every company working remotely now does—you’ll probably need to go with a cloud-based VPN or zero-trust network access (ZTNA) solution to secure perimeters and allow for remote access.

Build tunnels and protect them. Gateway access control and tunneling are effective ways to improve security on your network. If you’re using a cloud VPN, you could deploy a dedicated private server and use IP whitelisting to allow access for employees. More advanced business VPN solutions allow for team-gateway access control for greater segmentation. If you’re looking for a perimeter-based solution, ZTNA can provide effective remote-work security with a strong policy to ensure access control.

Protect against network threats. The most effective security is at device-level, so ensure hardware is patched, software is updated, and endpoints are protected—this means antivirus, antimalware, password protection, multi-factor authentication, etc. Protecting devices is critical in the current bring-your-own-device environment. Ensuring adequate protection at device level makes network-level security that much easier.

Secure your devices

Update and patch everything—always. Hardware must be patched, software must be updated, and employees should be aware of the risks if they fail to do so. These things are just so critical that they can’t be forgotten about or ignored. Tell employees that those annoying updates matter—and instruct them to always reboot when instructed and perform regular checks to ensure everything is up to date.

Secure applications, secure devices. Combine your relentless updating with antimalware and antivirus software. Some operating systems, like Windows, benefit from antivirus more than others. Most will benefit somehow. Beyond that, biometric identification and two-factor authentication can ensure you limit the potential for human error, credential theft, and social engineering.

Work smarter, not harder

Use systems that make remote work easier—and safer. Things like single sign on and password management don’t just keep your remote teams safe; they also make life easier and increase efficiency. Still, far too many companies don’t ensure employees use these tools consistently. Make sure you’re not one of them.

Figure out access control—not only for greater flexibility, but for security, too. Whether it’s cloud-based or hardware, firewalls and IP management can allow your employees to access resources securely and without constant and time-consuming verification. Companies need to sort out what firewalls they need, what segmentation they require based on compliance or infrastructure security, and what solutions will allow them to give their remote workers convenient and secure access control.

Choose tools and limit access. Mitigate threats to internal systems with sensible policies that diagnose what needs to be accessible and what doesn’t. Remote workers and teams have different needs, and limiting the tools and resources you make accessible is a relatively easy step to reduce risk.


About The Author

NordVPN Teams’s picture

NordVPN Teams

NordVPN Teams is a cloud-based VPN for business from the world’s most advanced VPN service provider, NordVPN. NordVPN Teams has a full range of features to ensure convenience and powerful digital protection for organizations of all sizes, freelancers, and remote teams. NordVPN Teams offers advanced 256-bit encryption, secure remote access, malware blocking, two-factor authentication, unsecured traffic prevention, automatic connection on Wi-Fi networks, and 24/7 customer support. NordVPN Teams is available on all major platforms.