Given the increase in remote work due to the Coronavirus disease, the Department of Homeland Security Cybersecurity and Infrastructure Security Agency is urging organizations to adopt heightened best practice cybersecurity for enterprise virtual private network (VPN) solutions.
VPNs provide secure remote access to internal networks and are often used to remotely and securely connect to an organization’s network to easily access and electronically share data.
However, a variety of VPN applications have vulnerabilities that could allow a hacker to take control of affected systems. Some patches have been released, but organizations should be sure they’ve updated to the latest system or employed workarounds.
Hackers have been targeting the VPN vulnerabilities in the US and other countries since the initial alert. Those attacks have continued through March, but many organizations have still failed to patch those known vulnerabilities. With the increase in remote work, CISA is also warning organizations that hackers are finding and targeting vulnerable VPN connections with malicious cyberattacks.
Further, as VPNS are likely always in use, it’s not always possible to keep them updated with the latest security updates.
As a result, cybercriminals will likely increase the rate of phishing emails targeting teleworkers to steal credentials. And those organizations that have not implemented multi-factor authentication (MFA) for remote access will be more susceptible to phishing attacks.
In response, organization should:
Your IT provider should:
Considering many organizations are asking employees to telecommute, hackers will likely prioritize breaking into VPNs. Patching known bugs is step one (and absolutely critical), but it’s not enough. There are unpatchable weaknesses and non-public issues that hackers can exploit. To secure against these unknowns, companies need to look at the fundamentals.
As a leader or executive in your business, it is your job to prepare for…