Is Work from Home safe?
Is "Work from Home" safe?
As more and more people adopt the concept of working from home, most companies look for various technology that supports these concepts. One of the most common approaches is using Microsofts TeamViewer or the Remote Desktop Protocol (RDP) that are readily available on every Windows OS.
Using RDP, you can remotely connect to a computer or server's desktop from anywhere in the world as long as both computers have an internet connection.
The RDP would sound like excellent cost savings and a convenient solution for the mobile worker. It's posses a high risk and becomes an inviting opportunity for attackers. As anyone can access RDP anywhere from the internet (which is the primary purpose of this tool), the requirement to access is merely a valid password. It would allow the user to perform just like they were sitting at the keyboard in front of that computer after keying in the correct password.
Again, with everything on high-speed, always-on internet, and computer getting faster, imagine how soon before anyone's password will sustain? The algorithm allows a hacker to guess over 100 trillion combinations in a second. The technique is commonly known as "brute-force" attacks that can be quickly initiated against RDP while guessing the correct password. Using high-speed access to guess usernames and passwords, trying all known password variations will often gain access within a few days to weeks.
As above, Remote Access Protocols (RDP and RDWeb) pose a significant risk to organizations of all sizes. By leaving these capabilities, active RDP or RDWeb exposing to the internet is a ticket for hackers to obtain data, turning any RDP server into a Zombie computer for their next job.
Despite RDP's shortcomings, it's still a cost-effective and convenient service that many businesses rely on, especially working from home.
To properly protect and implement RDP securely, Always consider the following combination :
- VPN - a Virtual Private Network.
- By implementing corporate VPN over RDP, the RDP will no longer have direct exposure to the internet. VPN will limit access to RDP by granting permission to pass through.
- Firewall or filtered access
- Such a system can restrict access from a limited location or configure the firewall to allow RDP access from those locations. This technique's disadvantage is that it requires a static IP address and may not be suitable for accessing from an ad-hoc location such as a restaurant or coffee shop. Still, it can access RDP from home or a branch office securely.
- Use Multi-Factor Authentication (MFA) or 2FA
- Using MFA or two-factor authentication, the attacker will be unlikely to obtain all the external information and be unable to guess. The external authentication factors may be a challenging question from any of the following:
- Knowledge of a user (i.e. Color of the first car ever driven),
- Possession (using a YubiKey, one-time password sent to cellphone etc.) or
- Inherence (i.e. as fingerprint, retina scan, voice recognition)
Access to the network depends on correct combinations of the above and the password, thus will make the effort of password guessing worthless without the other.
Cybersecurity procedure measurement's objective is not to restrict what a user can or cannot do but to ensure security and protect data while maintaining user flexibility and ability to work productively.
Cyber insurance liability coverage protects the financial losses resulting from data breaches and other cyber events. Most cyber policies include both first-party and 3rd party coverages. Talk to your insurance broker to determine what is included and what other options are available separately.
First-party coverages will pay expenses to the company directly incurs due to the infringement of data, like the cost of informing your clients about a possible attack.
Third-party coverage, on the other hand, applies to claims against insured by individuals or businesses that suffered financial losses as a result of the breach, and the insured failed to act in time.
A typical example here, a client sues a business for negligence following a hacker steals his data from the computer system and releases it online.
Here are the types of first-party coverages you're very likely to find at a cyber liability policy. These coverages can be subject to your deductible.
Covers income losses a business suffered and expenses incurred to prevent or decrease the company's shutdown after a computer system fails due to a covered peril.
This section of cyber insurance coverage will cover the cost for a business to replace or restore, consider insurance for cyber security
1) electronic data or
2) programs destroyed or
3) stolen from a data breach,
whether the information belongs to your company or in your care.
Losses should result from a covered danger like a hacker attack, a virus, or even a denial service. This would sometimes cover the costs of consultants/experts to help recover data.
This applies when a hacker breaks to a business computer and threatens to commit a nefarious act for ransom. Some act including
- threaten to erase data,
- introducing a virus,
- initiating a denial of service attack,
- or disclosing sensitive data
If you do not pay a specified amount in time.The coverage typically will provide extortion of payment and expenses you incur in responding to a claim made.
Covers the costs of notifying parties impacted by a data breach. It can also cover the cost of establishing a call center and supplying credit monitoring services.
- Some policies can cover the costs you incur to get promotion and public relations to guard your institution's reputation following a data breach. This coverage can be known as Crisis Management. Every Cyber Liability Policy contains specific terms, which are explained in the Definitions section. Talk to your insurance broker regarding cyber insurance coverage, or insurance for cyber security needs.
Some policies may cover dependent income losses. These are income losses you maintain when the network provider's system has been breached.
The liability coverages afforded by cyber policies are usually claims-made. Coverage usually applies to damages or settlements that result from covered claims and the cost of your defence. Note that defence costs may reduce the limit of insurance.
This feature will cover network or privacy claims against the business. Any negligence acts, mistakes, or omissions that result in a denial of service attack, the introduction of a virus, unauthorized access, or other security breaches of the insured business computer. It also covers claims alleging the company failed to protect sensitive data stored on their computer system properly. Even the data may belong to customers, clients, employees or other parties.
This part of cyber insurance coverage protects lawsuits against a business from acts like defamation, slander, copyright infringement, invasion of privacy or domain name infringement. Generally, these acts are only covered if they result from your electronic data publication on the internet.
This insurance section will cover fines or penalties imposed on the firm by regulatory agencies overseeing data breach laws. It also covers the cost of hiring an attorney to assist in your response to a regulatory proceeding.
Cyber insurance coverage policies will protect your business from claims and expenses resulting from data breaches. Each cyber insurance coverage is not standardized and may contain unique terminology.
Most policies are flexible enough so that you can choose the coverages you want. If you need help with your insurance policy, ask your agent or broker for assistance for any insurance for cyber security. For information about other types of insurance, click here.