Page 52 - Cyber Defense Magazine for August 2020
P. 52
Also, while VPN might look like the best option for providing network security via encryption, if
the VPN connects to any of the compromised devices, for example, the personal tablet of the
employee, the hackers can crawl in the gaps created. It is important to ensure endpoint
authentication to VPN access via certificate management, for instance, to ensure that only
managed/work devices are connected to such networks. Needless to say, monitoring the VPN
security at all times, recognizing potential failures, and extending support via patch management
is crucial.
It is also important to note that if the employees are using legacy PCs, managing them outside
of the corporate network or via VPN is practically impossible. In such cases, quickly procuring
the latest tech by leasing or leveraging ‘desktop as a service’ can be a good option.
Phishers taking advantage of emotional vulnerabilities
Reports of increased phishing scams since the COVID-19 pandemic are surfacing. People are
vulnerable, anxious and it is a tough time for all. The employees are susceptible to click on
malicious emails that appear to be from government agencies, healthcare bodies, or WHO or
might give away critical personal data to healthcare-related apps that are not authorized.
Cyber Defense eMagazine – August 2020 Edition 52
Copyright © 2020, Cyber Defense Magazine. All rights reserved worldwide.