{"id":8888,"date":"2020-07-13T07:04:10","date_gmt":"2020-07-13T07:04:10","guid":{"rendered":"https:\/\/www.experfy.com\/blog\/?p=8888"},"modified":"2023-11-29T14:48:10","modified_gmt":"2023-11-29T14:48:10","slug":"safeguard-your-remote-workforce","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/safeguard-your-remote-workforce\/","title":{"rendered":"Safeguard Your Remote Workforce"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8888\" class=\"elementor elementor-8888\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-797c8985 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"797c8985\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-58376068\" data-id=\"58376068\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1a1950f2 elementor-widget elementor-widget-text-editor\" data-id=\"1a1950f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>DDoS attacks on VPN servers can not only bring remote work to a standstill but also cut off admins from accessing their systems. Here are three ways to stay safer.<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-114a0e1 elementor-widget elementor-widget-text-editor\" data-id=\"114a0e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>Operational continuity is crucial for organizations at the best of times \u2014 and right now, we&#8217;re a long way from the best of times. The evolving COVID-19 pandemic has introduced extraordinary challenges for individuals and organizations alike, and retaining a semblance of normality amid the mass shift to home working and online service delivery is proving to be an uphill struggle for many businesses.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>A crucial part of ensuring operational continuity, or something close to it, throughout the pandemic is cyber resilience \u2014 that is, being able to ensure continuity of digital services, from the applications and data that employees need to carry out their duties from home to any customer-facing elements such as e-commerce websites and mobile apps.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-341ab90 elementor-widget elementor-widget-text-editor\" data-id=\"341ab90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>But how is the pandemic affecting organizations&#8217; cyber resilience \u2014 and how can they meet the challenge head on, to mitigate the risks to their business?<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>Cyber Resilience Is Multifaceted<br \/><\/strong>Cyber resilience is not only about ensuring that key digital systems and applications continue to be operational. It is about protecting those systems and applications from malicious interference, whether because of digital vandalism or more sophisticated attempts to infiltrate the organizational infrastructure and steal data.<\/p>\n<!-- \/wp:paragraph -->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85c0754 elementor-widget elementor-widget-text-editor\" data-id=\"85c0754\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>It is also about protecting the organization&#8217;s online reputation, ensuring that damaging or untrue news stories do not proliferate across social media. The unfolding coronavirus pandemic is having a dramatic impact on organizations&#8217; ability to manage all three of these aspects.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>VPN Access Turns into a Bottleneck<br \/><\/strong>Operational availability of core systems and applications has been challenged by the drastic change in working circumstances to which most organizations must adapt. The shift to home working has required organizations to deploy new collaboration and conferencing tools, organize new cloud service delivery models and perhaps secure VPN access for staff working from home, and even get new hardware out to remote staff. This is costly and complex.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6531307 elementor-widget elementor-widget-text-editor\" data-id=\"6531307\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>Meanwhile, many of the organizations supplying such services have had to rapidly reorganize in order to ensure continuity of service amid huge spikes in demand.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>That migration to remote working and reliance on using VPNs also elevates cyber-risk. &#8220;With these systems now categorized as critical, the &#8216;expected business impact&#8217; of an attack substantially increased, driving up overall business risk,&#8221; says Andy Shoemaker, founder and CEO of NimbusDDoS, a Boston-based pen-testing provider.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>If the organization&#8217;s VPN server is attacked, it affects everything: not just the remote workers trying to access corporate resources but also network admins working remotely. The attack could lock them out of management consoles, meaning they are unable to make network changes to remediate the problem. In this scenario, having to scramble a member of the IT team to headquarters to start redirecting IP traffic could easily mean hours of downtime and disruption. Put simply, the remote access capability that is keeping the business going has also become a single point of failure.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>&#8220;Pathways into the infrastructure are substantially reduced, and it&#8217;s possible you may lose access completely during an attack,&#8221; Shoemaker says. &#8220;Also, incident response processes are usually designed based on assumptions regarding staff availability, and system access. If these are impacted seriously, as they have been during the pandemic, then the procedures themselves can break down, further extending downtimes. Especially during periods of financial hardship, a person with the skills to perform a DDoS attack may be compelled to engage in extortion-motivated DDoS attacks.&#8221;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>Attacks Are Up 30%<br \/><\/strong>It&#8217;s no surprise that organizations have noted a substantial increase in the volume and type of cyberattacks being leveled at businesses, many seeking to capitalize specifically on fear and uncertainty around the virus. Link11 has witnessed a notable\u00a0<a href=\"https:\/\/www.totaltele.com\/505216\/Link11-Warns-of-30-Increase-in-Length-of-DDoS-Attacks-and-Disruption-Risks-as-Organizations-Accelerate-COVID-19-Remote-Working-Plans\" target=\"_blank\" rel=\"noreferrer noopener\">30% increase<\/a>\u00a0in the volume of DDoS attacks defended against from February 17 to March 9 compared with the same period in 2019 (disclosure: I&#8217;m the COO of Link11). Other organizations have reported similar increases. Some of these may well be motivated by extortion or revenge \u2014 especially as the pandemic has meant many organizations have made employees redundant or furloughed staff.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Alongside DDoS attacks, ransomware is proving particularly effective, as phishing emails and messages exploit very real desires for information and advice related to the pandemic.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>And of course, should a business fall victim to any such attack, the potential reputational risk remains. Bad news travels fast online \u2014 particularly with so many people working from home and trawling news and social media sites.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>How to Build and Maintain Cyber Resilience<br \/><\/strong>Today, most organizations operate fragmented IT landscapes comprising on-premises equipment, and a growing number of workloads hosted in private clouds and public clouds. To ensure a holistic security layer across these complex, hybrid environments, organizations should follow these steps:<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>1. Act, don&#8217;t react.<br \/><\/strong>Cyberattacks rarely occur in isolation. Organizations that experience DDoS attacks often also report theft of intellectual property, customer data or financial assets, and resources. Criminals will often launch a DDoS attack against one part of an organisation to divert attention from a hacking attempt or malware exploit. Therefore, comprehensive DDoS mitigation should be a key part of an organization&#8217;s defences.\u00a0<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>2. Have a shield in the cloud.<br \/><\/strong>To deliver that protection, all traffic to the organization&#8217;s website and resources should be routed via an external cloud service that uses algorithms and machine learning techniques to identify and filter out all malicious traffic instantly\u00a0<em>before<\/em>\u00a0it affects critical services. This means the organization&#8217;s IT and security teams cannot be distracted by a diversionary DDoS exploit, enabling them to focus on blocking stealthy, targeted attacks.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>3. Protect your APIs.<br \/><\/strong>These stealthy attacks include targeting web applications and the APIs they use, with the aim of exfiltrating data. Criminals are increasingly looking to exploit these as they typically have low levels of protection and monitoring. They&#8217;re also the weakest link within the IT value chain and can easily bring operations to a halt when they are flooded. Victims of this type of attack include a\u00a0<a href=\"https:\/\/sports.yahoo.com\/equifax-security-breach-affected-millions-153123612.html\" target=\"_blank\" rel=\"noreferrer noopener\">leading credit-checking agency<\/a>,\u00a0which resulted in over a million consumer records stolen. Organizations should assess the risk exposure of their web applications and APIs, deploy automated solutions that can dynamically adapt to new threats, and block attacks before they can reach the application itself to help stop breaches happening.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>This &#8220;new normal&#8221; that we are all experiencing will only be temporary. But the positive impacts of putting such protections in place could last a lifetime.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>DDoS attacks on VPN servers can not only bring remote work to a standstill but also cut off admins from accessing their systems. Here are three ways to stay safer.<\/p>\n","protected":false},"author":166,"featured_media":8889,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[443,441,230,442],"ppma_author":[1950],"class_list":["post-8888","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-cyberattack","tag-ddos-attacks","tag-remote-work","tag-vpn-servers"],"authors":[{"term_id":1950,"user_id":166,"is_guest":0,"slug":"marc-wilczek","display_name":"Marc Wilczek","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_00058d24-991e-4fe8-b65f-2188edaded40-150x150.jpg","user_url":"http:\/\/www.marcwilczek.com","last_name":"Wilczek","first_name":"Marc","job_title":"","description":"Marc Wilczek, Chief Operating Officer at Link11, is a columnist and recognized thought leader helping organizations drive their digital technology. Over the past 20 years, he has held various senior leadership roles across the ICT industry. Previously, he was a member of the management board of T-Systems\u2019 Computing Services &amp; Solutions (CSS) division. Besides being a public speaker, he has authored dozens of publications featured in CIO Magazine, InformationWeek, Bloomberg, Information Management, DarkReading, ZDNet, and others."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/8888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=8888"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/8888\/revisions"}],"predecessor-version":[{"id":34487,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/8888\/revisions\/34487"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/8889"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=8888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=8888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=8888"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=8888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}