With the observation of a surge of phishing attacks and ransomware precursors in the wild, organizations need to prepare for a potential future deluge of operational disruptions and or data loss.
A risk paradigm shift
As expected, we are seeing a surge in teleworking from companies across the globe. The challenge that most are facing is how to maintain the same level of cybersecurity while employees are required to work from home. To address these challenges, security compromises are being made to meet the demand, including allowing the introduction of non-secure assets and platforms. Examples can include bring your own device (BYOD), cloud applications, and teleconferencing solutions.8
This new reality can impact current detection and response capabilities. Most current incident response (IR) and disaster recovery (DR) plans were not designed for such an increased remote workforce. Many of the on-premise security tool sets may not be present on all assets and services used from home, including end-point detection and response (EDR), network monitoring, firewalls, DLP (Data Loss Prevention) and sometimes certain authentication controls.
The threat predictions made several weeks ago are quickly becoming a reality with threat actors continuing to exploit the uncertainty and publicity of the pandemic. The impact of such attacks is significant and will continue to amplify due to disruption of workforce, communication, and coordination.9
Enterprises must continue to employ multi-faceted risk mitigations and bolster their people, process, and technology to defend against the continuously evolving threats.
As we continue to adjust to the present reality, here are some further recommendations in addition to those previously published (COVID-19: Five steps to defend against opportunistic cyber attackers):
- Understand your enterprise remote connectivity and authentication capabilities (i.e., remote desktop, VPN [Virtual Private Network], LANDesk, WebEx, etc.). Be thoughtful of potential workarounds which employees might be using to do their work and keep in mind insecure use of these technologies is the easiest path for an attacker.
- Assess and implement new security analytics models to account for privileged activity and use of new administrative tools and services.
- Review current email security controls with consideration of current remote work force posture. Utilize current controls provided by your email provider to the fullest before looking to purchase additional services or technologies.
- Assess the current visibility of assets and network traffic to identify what has changed with regards to workforce relocation. If gaps exist, consult with your team to determine the best approach to regain visibility and security.
- Update and test your incident response and disaster recovery plans to ensure they are applicable to the current state of your workforce. Update your external incident response provider and consider an additional external provider if a more appropriate response time is needed.
- Test the ability to recover from your backups in a timely manner with a keen eye to ensure your organization is backing up all the data it needs in a format that is accessible yet secure to prevent both explicit or inadvertent tampering or corruption.
- Review, update and recommunicate cybersecurity training to all employees. Ensure that the latest threats to your organization and employees are highlighted.
Summary
Opportunistic cyber attackers continue to use COVID-19 as a theme to target users with sophisticated phishing messages. We must now assume that some of that activity will be successful. This article highlights seven recommendations for cybersecurity teams to consider, to help strengthen their organization’s cybersecurity.