One of the characteristics of APTs is some type of social engineering tactic where the bad guys somehow con an internal user to download a malicious executable. This creates an internal outpost where hackers can steal credentials, scan the network, and ultimately steal valuable data.
Recent ESG data points to an alarming reality: Remote workers (i.e. those that work in remote offices and branch offices) are "sitting ducks" for these kind of attacks.
ESG asked IT professionals to identify their top security challenges with regard to support remote workers. The top four security challenges mentioned were as follows:
46%: Managing remote PC security and configurations
46%: Training and enforcing corporate security and compliance policies for Remote Office/Branch Office (ROBO) employees
38%: Monitoring the use and storage of sensitive data accessed by remote employees
34%: Remote user authentication and access controls
To use a technical phrase -- holy cow! So remote worker PCs don't have the right security signatures or OS patches. Remote workers themselves lack training and security knowledge. Meanwhile IT has no idea what data is on these PCs and remote workers may have access to sensitive information they shouldn't have. There may also be a bunch of stale remote worker accounts that remain active.
Never mind sophisticated APT attacks, the bad guys can put their trainees on remote worker targets and still infect their PCs in many cases.
While it may be obvious, it is worth mentioning that we've spent the last 10 years or so centralizing IT so remote workers generally access mission-critical business applications and IT services over the WAN. What this means is that these extremely vulnerable remote worker PCs have an express train to the corporate jewels.
As the old security saying goes, "the security chain is only as strong as its weakest link." If we don't address these remote worker vulnerabilities than all of the corporate security best practices and best-in-class security technologies don't matter -- the bad guys will simply enter through the remote office back door.
This story, "Remote Workers are Easy Targets for APTs" was originally published by Network World.