How to address the security risks of a remote workforce

 

Connecting state and local government leaders

The larger, unprotected perimeter that comes with employees working from home increases the likelihood of a data breach or other cyberattack.

As part of the COVID-19 pandemic response, a much larger number of government workers are working from home. We may see this trend continue beyond the pandemic given the increases in productivity and efficiency that are being realized by agency leaders. But there is a downside to the work-from-home movement as well – a greater likelihood of a data breach or other cyberattack stemming from the expanded, yet largely unprotected, perimeter that comes with a remote workforce.

With more people working from home, the network perimeter has expanded significantly to wherever users sit or use their devices, exposing government agencies to both outsider attacks and insider vulnerabilities like never before. Over the past month or so, data coming from our Dtex Intercept Insider Threat Platform reveals that an average of 9.2% of home-based workers across all industries are circumventing VPNs.  That number will likely grow over the coming weeks as VPN bandwidth becomes saturated, slowing connectivity speeds and reducing productivity.

Additionally, we have seen an 81% increase in “unapproved” online file sharing on major sites like Google Docs and Dropbox, and a 14% decrease in Microsoft Office usage, despite most organizations reporting an increase in overall user internet activity, further indicating that employees are bypassing their organization’s security protocols. This experience is reflected across the private and public sectors alike.

Traditional cybersecurity relies on perimeter solutions that attempt to prevent intrusions and leakage of confidential information. The sudden move toward working from home has expanded that perimeter exponentially. It’s now potentially thousands of disaggregated endpoints -- far too many to successfully secure the traditional way.

Additionally, the “not in the workplace” prohibition against some apps, devices and behaviors has been vacated as people work from home.  The visibility of activity and persistence of government workplace protocols have changed with the adjustment, and the “usual” threat reporting avenues are no longer available. As a result, cybersecurity protocols must quickly evolve to securely adapt to this new reality.

Here are three ways government chief information security officers and their teams can strengthen and broaden security of the perimeter to ensure protection of data and other digital assets.

1. Gain visibility of corporate assets -- everywhere, all the time. Effective cybersecurity protocols now require total visibility of government assets -- the ability to see and monitor activity in real-time, quickly recognize patterns and behaviors and move to isolate and eliminate threats before they become breaches. Security teams can accomplish this through non-intrusive monitoring and machine learning technology that analyses telemetry from data, machines, applications and people. With this kind of total visibility, CISOs can then take actionable steps to block attempted threats and correct bad behaviors such as accidental data loss or malicious data theft, circumvention of security controls by users or theft and unauthorized use of user credentials by outsiders.

2. Immediately detect bad behavior before it leads to a security breach. While malicious insiders usually represent a small percentage of the user base, it’s critically important to identify them immediately and capture a full audit-trail to stop them before they steal data or sabotage systems. The same applies to malicious outsiders who somehow manage to get access to government systems -- their behavior should be detected immediately so that sensitive systems and legitimate user accounts can be quarantined.

3. Identify teachable moments to inform targeted security training and modify behavior. Teachable moments can come from the common mistakes that users make as part of their day-to-day activities. If left unchecked, these accidental security breaches expose government agencies to ongoing vulnerabilities. By recognizing these non-malicious breaches as teachable moments, agencies can engage employees and promote a more security-conscious workforce, drawing workers’ attention to relevant security risks that are directly attributed to their behaviors.

Long-term alignment with government security objectives must focus on targeted employee training to drive awareness through real-time analysis and recognition of behavior and patterns, both on-network and off-network, across all data, machines, applications and people.

Before COVID-19 struck, government agencies already were challenged with protecting against an ever-expanding threat landscape and maintaining a solid security posture. Now, with a large share of workers accessing networks and files from home and circumventing VPNs, the security risks have grown even greater. However, there is light at the end of the tunnel, as CISOs can take advantage of emerging artificial intelligence platforms and machine learning to develop new protocols and take appropriate action.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.