Is it really safe to work from home, or are there risks?
Is "Work from Home" safe?
As more and more people adopt the concept of working from home, most companies look for various technology that supports these concepts. One of the most common approaches is using Microsofts TeamViewer or the Remote Desktop Protocol (RDP) that are readily available on every Windows OS.
Using RDP, you can remotely connect to a computer or server's desktop from anywhere in the world as long as both computers have an internet connection.
The RDP would sound like excellent cost savings and a convenient solution for the mobile worker. It's posses a high risk and becomes an inviting opportunity for attackers. As anyone can access RDP anywhere from the internet (which is the primary purpose of this tool), the requirement to access is merely a valid password. It would allow the user to perform just like they were sitting at the keyboard in front of that computer after keying in the correct password.
Again, with everything on high-speed, always-on internet, and computer getting faster, imagine how soon before anyone's password will sustain? The algorithm allows a hacker to guess over 100 trillion combinations in a second. The technique is commonly known as "brute-force" attacks that can be quickly initiated against RDP while guessing the correct password. Using high-speed access to guess usernames and passwords, trying all known password variations will often gain access within a few days to weeks.
As above, Remote Access Protocols (RDP and RDWeb) pose a significant risk to organizations of all sizes. By leaving these capabilities, active RDP or RDWeb exposing to the internet is a ticket for hackers to obtain data, turning any RDP server into a Zombie computer for their next job.
Despite RDP's shortcomings, it's still a cost-effective and convenient service that many businesses rely on, especially working from home.
To properly protect and implement RDP securely, Always consider the following combination :
- VPN - a Virtual Private Network.
- By implementing corporate VPN over RDP, the RDP will no longer have direct exposure to the internet. VPN will limit access to RDP by granting permission to pass through.
- Firewall or filtered access
- Such a system can restrict access from a limited location or configure the firewall to allow RDP access from those locations. This technique's disadvantage is that it requires a static IP address and may not be suitable for accessing from an ad-hoc location such as a restaurant or coffee shop. Still, it can access RDP from home or a branch office securely.
- Use Multi-Factor Authentication (MFA) or 2FA
- Using MFA or two-factor authentication, the attacker will be unlikely to obtain all the external information and be unable to guess. The external authentication factors may be a challenging question from any of the following:
- Knowledge of a user (i.e. Color of the first car ever driven),
- Possession (using a YubiKey, one-time password sent to cellphone etc.) or
- Inherence (i.e. as fingerprint, retina scan, voice recognition)
Access to the network depends on correct combinations of the above and the password, thus will make the effort of password guessing worthless without the other.
Cybersecurity procedure measurement's objective is not to restrict what a user can or cannot do but to ensure security and protect data while maintaining user flexibility and ability to work productively.
Cyber insurance protects against losses resulting from data breaches and other cyber events. Without the insurance, the first-party and 3rd party coverages, the company will have to face a heavy fine from the regulator and legal bill for Damage, not only the cost of data recovery. Your insurance broker is in the best position to explain what a policy includes and what other options are available separately. Look for a digital broker who knows these technology products.
Having First-party protection will pay the company on cost incurs due to the infringement of data, such as the cost of informing clients about a possible breached.
With Third-party coverage applies to claims against an insured by any business/individuals suffered financially due to the breach, legal action against the insured failed to act in time to stop the Damage.
Cyber insurance will protect businesses from any claims and expenses due to data breaches. The cyber insurance policies offered by insurance companies are unique, non-standardized and may contain terminology that varies.
Most cyber insurance policies are flexible that offer the insured to choose the coverages. For information about all other cyber insurance options, click here.
Covers income losses a business suffered and expenses incurred to prevent or decrease the company's shutdown after a computer system fails due to a covered peril.
This section of cyber insurance coverage will cover the cost for a business to replace or restore, consider insurance for cyber security
1) electronic data or
2) programs destroyed or
3) stolen from a data breach,
whether the information belongs to your company or in your care.
Losses should result from a covered danger like a hacker attack, a virus, or even a denial service. This would sometimes cover the costs of consultants/experts to help recover data.
This applies when a hacker breaks to a business computer and threatens to commit a nefarious act for ransom. Some act including
- threaten to erase data,
- introducing a virus,
- initiating a denial of service attack,
- or disclosing sensitive data
If you do not pay a specified amount in time.The coverage typically will provide extortion of payment and expenses you incur in responding to a claim made.
Covers the costs of notifying parties impacted by a data breach. It can also cover the cost of establishing a call center and supplying credit monitoring services.
- Some policies can cover the costs you incur to get promotion and public relations to guard your institution's reputation following a data breach. This coverage can be known as Crisis Management. Every Cyber Liability Policy contains specific terms, which are explained in the Definitions section. Talk to your insurance broker regarding cyber insurance coverage, or insurance for cyber security needs.
Some policies may cover dependent income losses. These are income losses you maintain when the network provider's system has been breached.
The liability coverages afforded by cyber policies are usually claims-made. Coverage usually applies to damages or settlements that result from covered claims and the cost of your defence. Note that defence costs may reduce the limit of insurance.
This feature will cover network or privacy claims against the business. Any negligence acts, mistakes, or omissions that result in a denial of service attack, the introduction of a virus, unauthorized access, or other security breaches of the insured business computer. It also covers claims alleging the company failed to protect sensitive data stored on their computer system properly. Even the data may belong to customers, clients, employees or other parties.
This part of cyber insurance coverage protects lawsuits against a business from acts like defamation, slander, copyright infringement, invasion of privacy or domain name infringement. Generally, these acts are only covered if they result from your electronic data publication on the internet.
This insurance section will cover fines or penalties imposed on the firm by regulatory agencies overseeing data breach laws. It also covers the cost of hiring an attorney to assist in your response to a regulatory proceeding.