All of us have seen or issued guidance that looks something
like this: “We are committed to doing our part to stem the spread of the
COVID-19 virus. Consistent with guidance from the World Health Organization,
the U.S. Centers for Disease Control and Prevention, and other national and
local health authorities regarding efforts to limit the spread of the virus, we
have taken steps to mitigate service disruption while protecting the health and
well-being of our associates. To advance these objectives, we have shifted some
of our service delivery and operations to function through work from home arrangements.”
The work from home (WFH) movement being enforced on and with
companies around the globe is helping to stop the spread of COVID-19. But it
also is opening up critical new risks to our economy that transcend the current
pandemic. Therefore, it’s critical that we evolve from simply implementing WFH
and find ways to ensure that citizens, companies, governments and the nation are
secure from home (SFH) as we work from home.John Carlin, former assistant attorney general for the U.S.
Department of Justice’s National Security Division and current chair of
Morrison & Foerster’s global risk and crisis management team, recently co-authored
an
article that said “while this worldwide crisis has introduced new
complexities and challenges, it also has presented an opportunity for hackers
seeking to capitalize on the pandemic to maximize the impact of cyberattacks on
government and private sector infrastructure. We expect nation states’ and
criminal groups’ activity to increase as they target newly vulnerable remote
employees and IT teams distracted by the dramatic increase in usage.”
It is known adversarial tradecraft – now playing out in real
time – to cause or exploit a big risk at the front door, while more quietly doing
damage through the back. This problem is being further exacerbated by outdated
guidance to simply use a virtual private network (VPN).VPNs were once the right answer, back in the days when fewer
than 20% of your workforce needed to work from home. This technology was the
right answer back when you had all of your secure systems in your own data
center instead of scattered across the clouds and containers. This old method of connectivity was the right answer when
adversaries didn’t bother targeting your company. VPNs were the right answer
when you had limitless budgets and trained security personnel to work with (ok,
that was a rare reality). But VPNs are not the right answer today for enterprises that
work in the cloud, that need their entire workforce to be fully productive from
home or are part of our critical infrastructure and the global economy. In
fact, advice to simply use a VPN is beginning to have the unintended
consequence of promoting less security in this mad dash to enable WFH.Here are some realities that the Unisys security teams are
seeing in the field today:
VPNs often are of questionable origin. These
include many of the ‘free’ or cheap VPN services that may or may not terminate
in some hostile place. Remember, if an internet service is free, it’s also likely
monetizing your data.
VPNs may encrypt from home to some corporate
network access point, but not necessarily to the actual applications. Instead they
may be switching back to clear text as the packets float through your network,
making them easily accessible to thieves or ransomers.
Some VPN concentrators are so overloaded that
they need massive injections of hardware, software licenses, rules managers and
time just to accommodate the increased demand.
Industry is facing a 400% increase in attacks on
VPN infrastructure. That adds to the chaos, with some of what we thought to be
load issues turning out to be hostile acts – think ransomware.
Worst of all, managers who have been given the
edict to facilitate WFH are sometimes opening the security doors and allowing
unsecured access because their VPNs can’t handle the job for everyone.
Clearly VPNs are Not Cutting ItIf your company has implemented a WFH strategy and is
experiencing some or all of the above, it’s a great time to make the move to a Zero
Trust model.This model supports the efficiency enabled by containers,
clouds and Kubernetes; understands the external and internal threats we all
face today; and enables the secure scalability that today’s operations demand.Making WFH into Secure From HomeAt Unisys, and with many
of our clients, we have one set of Zero Trust-directed security
policies that span on-premises, cloud, and
container deployments around the world. Using our Always
On Access methodology powered by Stealth®, which leverages
advanced and proven technologies including mobile, microsegmentation
and Kubernetes, we’re able to add as many home/remote users as
necessary, maintain security, identity, and encryption all the way to the
applications. In fact, within the first week of the COVID-related mandates,
Unisys went from approximately 15% remote workers to over 90%, and that change
was completely transparent to the global workforce. Increasing
employee productivity without sacrificing security, timeliness or budgets
is possible, and being realized right now.Like firewalls before them, VPNs have had their day. But the
realities of the new digital enterprise, compounded by the newest reality of
the global pandemic, requires that enterprises rethink their security. It’s
time to immediately double or triple the number of employees that can be
securely productive, and to make Zero Trust work for you.There’s a lot riding on this. Tom Patterson is Chief Trust Officer, Unisys
Keyfactor research finds that about 18% of RSA-based digital certificates have flaws ranging from trivial to very serious. A new tool promises to find them.
Quantum computers could arrive any day, yet it'll take years to swap out vulnerable encryption algorithms for "quantum-safe" replacements. Here's why and how to start the transition now.