Page 52 - Cyber Defense Magazine for August 2020
P. 52

Also, while VPN might look like the best option for providing network security via encryption, if
            the VPN connects to any of the compromised devices, for example, the personal tablet of the
            employee,  the  hackers  can  crawl  in  the  gaps  created.  It  is  important  to  ensure  endpoint
            authentication  to  VPN  access  via  certificate  management,  for  instance,  to  ensure  that  only
            managed/work devices are connected to such networks. Needless to say, monitoring the VPN
            security at all times, recognizing potential failures, and extending support via patch management
            is crucial.











































            It is also important to note that if the employees are using legacy PCs, managing them outside
            of the corporate network or via VPN is practically impossible. In such cases, quickly procuring
            the latest tech by leasing or leveraging ‘desktop as a service’ can be a good option.



            Phishers taking advantage of emotional vulnerabilities

            Reports of increased phishing scams since the COVID-19 pandemic are surfacing. People are
            vulnerable, anxious and it is a tough time for all. The employees are susceptible to click on
            malicious emails that appear to be from government agencies, healthcare bodies, or WHO or
            might give away critical personal data to healthcare-related apps that are not authorized.






            Cyber Defense eMagazine – August 2020 Edition                                                                                                                                                                                                                        52
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   47   48   49   50   51   52   53   54   55   56   57