Connect with us

Hi, what are you looking for?


Transition to a Mass Remote Workforce-We need to check before trusting


Transition to a Mass Remote Workforce-We need to check before trusting

Whereas not a brand new apply, the sheer quantity of individuals required to stick to social distancing finest practices means we now have a mass workforce working remotely. Most enterprises and SMBs can help working remotely in the present day however many IT departments usually are not outfitted to scale to the numbers presently required. On this weblog we focus on the threats to enterprises and SMBs by way of this elevated distant workforce and find out how to mitigate the danger.

Cybercriminals search alternatives to attain their targets and can observe the trail of least resistance. The preliminary entry vectors enumerated in MITRE ATT&CK usually utilized by cyber criminals are phishing or exploitation of vulnerabilities to realize entry to a company, and are used to behave on their malicious targets. Now that workers have migrated to their houses to work remotely, cybercriminals will goal the insecurities of client methods and networks to realize entry to firms. As Raj Samani highlighted in a earlier submit, focused ransomware assaults are fueling the elevated demand within the underground for compromised company networks. If workers entry company networks from pre-infected unmanaged machines with out ample safety measures, it creates a a lot bigger assault floor for cybercriminals. This will increase the danger of a company falling sufferer to a possible breach and ransomware lockdown.

COVID-19 social distancing restrictions got here into impact very quickly, giving organizations little time to arrange for securely managing their workforce remotely. It’s important that organizations proceed to do enterprise throughout this robust time, however they have to additionally do it securely to forestall an assault equivalent to ransomware. To guard organizations on this present local weather we should method this from two views:

  1. Know your atmosphere and customers
  2. Know your small business and actual threats

To grasp the threats of telecommuting at scale, we should perceive the applied sciences usually utilized by distant employees to execute their work and entry the group.

Know Your Surroundings and Customers

Per determine 1 under, you will need to perceive the structure and applied sciences being utilized by your workers inside your small business atmosphere. This offers you visibility into your potential publicity based mostly on vulnerabilities being actively exploited by menace actors with the intention to shield your distant employees and enterprise infrastructure/property.

Transition to a Mass Remote Workforce-We need to check before trustingBelief boundaries, frequent applied sciences and use instances in telecommuter deployments

Know Your Enterprise and Actual Threats

Adversary Alternatives

Adversaries want an preliminary entry vector to realize a foothold inside a company. They’ll usually hunt down company usernames and passwords utilizing strategies enumerated in MITRE ATT&CK, equivalent to phishing or distant exploitation of software program vulnerabilities. The telecommuter expertise will increase the assault floor considerably and is being exploited/researched as evident under:


Minimal technical controls for distant employee machines:

  • Safe configuration and robust passwords to forestall router compromise
  • Maintain all software program layers patched, VPNs and telecommuter functions
  • Don’t reuse passwords throughout private and work methods
  • Sturdy endpoint safety software program

Minimal technical controls for enterprise/SMBs:

  • Safety hygiene finest practices
  • MFA/2FA and logging for VPN accounts
  • VPN patching
  • Safe RDP entry
  • Segmentation of vital enterprise property
  • Information backups
  • Person and gadget identification for workers and third events/suppliers

Insurance policies:

  • Information loss prevention
  • Robust passwords
  • SaaS safety
  • Managed vs unmanaged gadget entry


  • Phishing and social engineering coaching based mostly on the present local weather context – “confirm earlier than trusting”
  • Maintain workers knowledgeable of phishing campaigns relative to your atmosphere and enterprise


Robust technical controls are a should to guard telecommuters within the present local weather and there may be additionally no substitute for worker phishing and social engineering coaching as a profitable phish can negate technical controls. Even MFA/2FA could be bypassed in some instances, utilizing superior phishing strategies, so we should all keep vigilant, beginning with ourselves to guard our organizations by adopting a “confirm earlier than trusting” method.

x3Cimg top=”1″ width=”1″ model=”show:none” src=”″ />x3C/noscript>’);safety while working remotely,staying safe while working from home,mcafee covid,www mcafee com wfh,mcafee blogs

You May Also Like


Introduction In previous articles we have talked about images of dockers, the origin and functioning of dockers and the dockers’ hub. In this document...


Linux desktops are good in many ways, but like Windows they are not known as the most efficient battery. This does not mean that...


The United States Supreme Court has indicated that it will finally solve a problem that has been causing legal problems for almost two decades:...


To secure your AWS assets, follow these AWS Identity and Access Management (IAM) guidelines. Locking the Root User Access Key for AWSAccount You use...