Centrend

Working Remotely? Are you secure?

Since the Coronavirus pandemic outbreak, there has been a massive surge of remote workers. Your information is at risk when remote access is not done correctly! Read on to learn what to avoid when it comes to remote workers.

Remote access requires careful thought and planning to keep business data private and safe. As a result of COVID-19, many organizations are rushing to piece together remote access solutions to mobilize their workforce and remain productive while serving customers.  The haste to mobilize has created a dangerous situation for business data. 

Since the Coronavirus pandemic outbreak, there has been a massive surge of remote workers. Your information is at risk when remote access is not done correctly! Read on to learn what to avoid when it comes to remote workers.

Remote access requires careful thought and planning to keep business data private and safe. As a result of COVID-19, many organizations are rushing to piece together remote access solutions to mobilize their workforce and remain productive while serving customers.  The haste to mobilize has created a dangerous situation for business data.  

Here are some of the things I see happening that create the riskiest scenarios:

  1. VPN Connections are being set up quickly by inexperienced personnel, and their encryption policies are weak. 

  2. Companies lack the knowledge to accurately monitor remote activity to identify and mitigate a data breach that originates from these new remote channels.

  3. When a VPN is not available, very insecure connections are being created to remote desktop servers, or directly to desktops. Remote desktop connections that are open to the outside world are vulnerable to all types of hacking.

  4. If systems have not been regularly patched and maintained, they are at risk of known vulnerabilities that hackers will exploit.

  5. Employees may be using their own computers to log in from home, and the individual’s computers lack adequate security protection.  The lack of sufficient security on the home computers allows an attack from the inside – through the VPN. An attack launched from within the trusted, secure tunnel is tough to identify and close the door on.

  6. Entry-level or free versions of software like Team Viewer, Logmein, or GoToMyPC are being used to provide remote control over office desktops. The limited versions of these software packages generally work well but offer limited or NO AUDITING capability. If your system is compromised, you will not know what the thieves stole or how long they had access to your business data.

Centrend wants to help.  We are now offering free consultation AND free implementation of remote access solutions to businesses affected by COVID-19. Reach us at 508-347-9550 or submit the Quick Contact form below to get help.

Scroll to Top