Content Server
Content Server
This article discusses unique challenges facing an organization’s remote employees in the
cybersecurity environment. With GDPR requirements to protect more data than before, the article
presents new perspectives to help management combat psychological trust factors and false
confidence in remote office situations.
Abstract ent support, using their phone or mobile device. Since remote
workers may not work from a corporate office space, tasks
This article discusses unique challenges facing an organiza-
such as emailing closing documents or personal financial
tion’s remote employees in the cybersecurity environment.
statements, e-signing documentation, or accessing the com-
It considers applying the Protection Motivation Theory for
pany’s shared drive happen wherever remote workers happen
security awareness and compliance with adapting informa-
to be.
tion system policies to include remote workers. With GDPR
requirements to protect more data than before, the article What else has changed? The ease and convenience of doing
presents new perspectives to help management combat psy- consumer or commercial business online has made us com-
chological trust factors and false confidence in remote office placent and unquestioning with sending or receiving sensi-
situations. tive account information over the Internet. Even with identity
theft, credit card fraud, compromised email, phishing, and
W
commercials about LifeLock identity theft protection, the
hile a diverse work environment reflects the reali- majority of us may become desensitized, thinking “It can’t
ty of the world today, information security profes- happen to me.”
sionals must help organizations understand that
It is important to understand that many remote workers
remote employees are human endpoints accessing enterprise
are not information security professionals. They have their
networks like those on-site, the only difference being some
expertise but are on there own dealing with Wi-Fi, a home
rather diverse office perks, distractions, and technological se-
router, local Internet configuration; a phone, tablet, laptop, or
curity challenges putting remote workers potentially more at
printer wherever it is connected; trusting email because it is
risk for a cybersecurity attack than traditional office workers.
in “ the cloud”; distractions that come with conducting busi-
While working remotely is not a new idea, protections need
ness outside of the “office”; and the false security of thinking
fresh insights.
“it won’t happen to me.” Their IT department and favorite
So, what is unique about remote workers and their security CISSP are no longer just a paper clip’s throw away from their
challenges? Oh, little things like their office is their phone and desk. Building value for the remote-worker business model
their meeting space is shared with strangers, not co-workers. comes with the need for security, and it is our job to incorpo-
Remote workers are doing everything that corporate work- rate training, policies, and procedures to do so.
ers are doing—from customer service to sales, from taking
loan applications to business banking, from processing data Remote worker distractions
to payroll, from medical billing to telemedicine, from talent Distractions for remote workers are different. Sometimes,
acquisition to onboarding, from system administration to cli- good sense goes out the window when individuals are out
of sight, out of mind, and outside of the proximity of the IT remote worker’s computer has been infected with ransom-
department. Distractions or stresses caused by a non-tradi- ware, taking control of the compromised machine may be
tional environment may contribute to an unintentional error. more difficult. Since a remote worker is not usually in close
Below are five vulnerabilities that can succeed from distrac- physical proximity to technical support, the steps to regain
tions and a false sense of security. control of a compromised, remote machine should be docu-
mented and accessible to IT staff. Although a machine with
Compromised email ransomware can be restored to a previous state, the files will
A remote employee of a financial institution recently sent the not be decrypted. To minimize the risks to working virtually,
assistant a request for a $40,000 wire. Only the remote em- safeguards include:
ployee didn’t send it. A bad actor did. Something did not look • Regularly backing up. In the event of a ransomware at-
right with the email, according to the assistant who imme- tack, backed up files can be re-created and re-stored
diately alerted IT. The remote worker’s email had been com-
promised. Had it not been for a close eye by the assistant, the • Ensuring a secure Internet or Wi-Fi connection through
intended wire fraud would have been successful. Multi-factor use of organization-owned, commercial-grade router with
authentication log in for all users would prevent this unau- password
thorized access. While this is not unique to remote workers, • Deploying multi-factor authentication for email
the isolation of being apart from a corporate location factors • Performing patch management for the OS—don’t run
in. In other words, the remote worker and assistant were not outdated software that cannot be patched
able to have a simple face-to-face conversation, so the assis-
tant had to rely on written text alone. Multi-factor authen- • Frequent network password changes
tication, usually a subscription fee per user, is a whole lot • Disabling remote desktop protocol (RDP) ports if you
cheaper than paying a forensics team, by the way. do not use them
Health care and financial services are two industries experi- JULY
encing a paradigm shift toward remote workers and that hold Standards Affecting Infosec
data with special GDPR categories: data concerning ethnic Editorial Deadline 5/15/18
origin, health, sexual orientation, etc. With the new regula-
tion, organizations that process data about individuals in the AUGUST
context of selling goods or services to citizens in European Foundations of Blockchain Security
Union countries must demonstrate they have implemented Editorial Deadline 6/15/18
the required data privacy and security controls [2]. GDPR
affects all companies that process and hold personal data of SEPTEMBER
individuals who live in the EU, regardless of where the com- Privacy
pany is located. Editorial Deadline 7/15/18
tablet, iPad, etc.) may be the only de- ADAPT INFORMATION SECURITY ASSESSMENT SHOULD INCLUDE SECURING REMOTE
vice. For the remote worker, the grade POLICIES AND PROGRAMS EMPLOYEES OR CONNECTIONS
of the router for the home office is as
important as the mobile device, the Remote worker policy • Implementing and managing information security
• Multi-factor authentication, pentesting, data-loss prevention policy
Internet or Wi-Fi connection, etc. To
evaluate standards for remote work- Cybersecurity risk assessment • Encryption
ers, consider the following: • Total number of Internet service provider (ISP) connections (includ-
ing branch connections)
• Do remote workers’ machines be- • Unsecured external connections, number of connections not users
long to the organization or the (e.g., file transfer protocol)
user? • Wireless network access
• Does a consumer/Internet-provid- • Personal devices allowed to connect to the corporate network
er router offer sufficient security • Network devices (e.g., servers, routers, and firewalls; include
physical and virtual)
safeguards or should a commer- • Locations of branches/business presence
cial-grade router be utilized? • Attempted cyber attacks
• Are servers supporting remote ma- • End-of-life (EOL) systems
chines supported for patching from Asset management • Tracking remote assets in inventory management
the manufacturer? • Tracking compliance
• What exactly is being monitored? • Tracking risk
Is there a problem with privacy? • Oversight and governance
• Track endpoints outside the firewall
• Can pentests be performed to spot
check remote machines? Patch management • Patches applied regularly and files backed up; OS releasing regular
patches and updates
The policy should include a mobile de-
vice manager (MDM) application and Mobile device management • Password protected, BYOD policy
define specifics such as: VPN compliance • Software firewalls, monitored access
• The process that mobile devices Password • Strong passwords, frequently changed
must meet to leave the corporate
network, stating that both the de- Data destruction • Shredders for home offices, hard drive destruction for retired assets
vice and any sensitive data should Figure 2 – Adapt information security programs for remote employees
be password protected.
• Support for different operating systems. Choose a VPN
• How mobile devices will be protected while outside the or-
that will protect all of your devices/platforms with just one
ganizational network.
VPN subscription.
• The process that mobile devices must meet to enter the
• No bandwidth limitations or traffic restrictions. Some
corporate network when being brought into a building
VPNs have bandwidth caps. Choose a VPN that has no
owned by the organization.
bandwidth limits [9].
Endpoint software can keep track of these devices.
Passwords
Virtual private networks
There is no substitute for strong passwords. Make sure re-
Virtual private networks (VPN) provide the productivity and mote workers receive frequent password-change notifications
cost benefits for collaboration that bridges physical separa- for systems, computers, etc. If a password reset is requested,
tion. But each uncontrolled remote computer potentially cre- ensure processes are in place for supporting remote workers,
ates another avenue of access to the network for attackers. If a wherever they are.
corporate VPN connection is not provided through the com-
pany network, remote workers should choose a VPN provider Data destruction
for their home network. A VPN for remote use should include Assets should be managed properly when being retired or be-
the following features: fore going offline to ensure they do not get lost or into the
• Strong encryption. Choose the best encryption possible wrong hands. Implementing secure procedures for tracking
(industry standard). assets before and after proper disposal may include provid-
ing a certificate of destruction including asset serial numbers
• Fast connections. A bad VPN can slow down your Inter-
to be destroyed and recycled. For remote workers turning in
net connection.
equipment, establishing processes for locating the asset to be
• A “no logging” policy. Choose a VPN provider that does returned, receiving the actual return of the equipment, and
not keep logs of users’ data to ensure activities aren’t being verifying the asset and its end of life should be part of the
recorded. program.
Figure 2 illustrates policies and assessments that should be national Journal of Information Systems and Social Change,
adapted to remote workers. 2018, Vol 9 No 1, https://www.igi-global.com/article/
non-compliant-mobile-device-usage-and-information-sys-
Conclusion tems-security-a-bystander-theory-perspective/192092.
Technology has changed the traditional workplace, and com- 7. Menard, P., Bott, G., and Crossler, R. “User Motivations
panies continue to expand remote employee opportunities. in Protecting Information Security: Protection Motiva-
At the same time, cybersecurity risks and diverse distractions tion Theory Versus Self-Determination Theory,” Journal of
present challenges for remote employees in organizations. Management Information Systems, 2018, 34:4, 1203-1230,
https://www.tandfonline.com/doi/full/10.1080/07421222.20
Keeping the remote employee in mind for awareness training 17.1394083.
based on psychological and personal perspectives in conjunc-
tion with organizational information security policies and 8. FFIEC. “Cybersecurity Assessment Tool Overview for Chief
programs may go a long way to establish protections for those Executive Officers and Boards of Directors,” Federal Finan-
on the front line as well as inside the organization. Infor- cial Institutions Examination Council, June 2015, https://
mation security professionals can help management deploy w w w.ffiec.gov/pdf/cybersecurity/FFIEC _CAT_CEO_
Board_Overview_June_2015_PDF1.pdf.
safeguards for remote workers as a part of the organization’s
information security program. Personalizing risks and con- 9. Jones, G. “Best VPNs for Freelancers and Remote Workers
sequences on a user level may heighten security awareness in 2018,” Adictive Tips, March 2018, https://www.addic-
and decrease the success of cyber attacks. By including train- tivetips.com/vpn/best-vpn-freelancers-remote-work/.
ing techniques with protection motivation along with system
safeguards to combat distractions, potential vulnerabilities,
About the Author
and threats, we can provide a full suit of armor for enabling Dr. Curtis C. Campbell, DM/IST, is a vice
remote employees to operate securely outside the organiza- president and IT procurement manager at
tion, wherever they are located. a financial institution, ISSA Chattanooga
Chapter co-founder and VP (Small Chap-
Resources
ter of the Year 2017). She is a member of the
1. KnowBe4, “KnowBe4 Raises $8 Million in Series A Funding Financial, Security Awareness, and Wom-
Led by Elephant Partners,” KnowBe4, Feb. 2 2016, https:// en in Security Special Interest Groups. Her
www.knowbe4.com/press/knowbe4-raises-8-million-in-se- professional background includes audit and compliance, risk
ries-a-funding-led-by-elephant-partners; “KnowBe4 Closes management, vendor management, cybersecurity, procure-
$30 Million Series B Investment,” KnowBe4, Oct 24 2017, ment, and IT project management in the enterprise. She can be
https://www.knowbe4.com/press/knowbe4-closes-30-mil-
reached at [email protected].
lion-series-b-investment.
2. Morrisey, M. “Managing GDPR Compliance with Effective
Use of Technology,” Risk & Compliance, March-April 2018,
https://docs.financierworldwide.com/riskandcompliance/
RC_Jan18_rc7894rc9085_digital/#?page=234.
3. Mansouri, S. and Raggad, B. “Evidential Modeling for
Telemedicine Continual Security,” International Jour-
nal of Computer Science and Network, October 2017,
ISSA Journal Back Issues – 2017
Vol 6 Issue 5, pp.559-562, https://www.researchgate.net/ ISSA.org => Learn => Journal
profile/Sofiene_Mansouri/publication/321481901_Evi-
Past Issues – digital versions: click the
dential_Modeling_for_Telemedicine_Continual_Secu-
rity/links/5a23cdf ba6fdcc8e86671f79/Evidential-Model- download link:
ing-for-Telemedicine-Continual-Security.pdf. Legal, Privacy, Regulation, Ethics
4. Lee, Lee, and Lui. “Protection Motivation Theory in Infor- Internet of Things The Cloud
mation System Adoption: A Case of Anti-Plagiarism Sys-
tem,” MCIS 2007 Proceedings, Dec.2007, http://aisel.aisnet. New Technologies in Security
org/cgi/viewcontent.cgi?article=1572&context=amcis2007. Big Data/Machine Learning
5. Boer, H., and Seydel, E. R. “ Protection Motivation Theory,” Cybersecurity in World Politics
in M. Conner and P. Norman (Eds.), Predicting Health Be-
haviour: Research and Practice with Social Cognition Models, Disruptive Technologies
Maidenhead, BRK, England: Open University Press, 1996, Health Care Addressing Malware
95-120, http://psycnet.apa.org/record/1996-97268-004.
Cryptography and Quantum Computing
6. Paravastu, N., Simmers, C., and Anandarajan, M.
“Non-Compliant Mobile Device Usage and Information
Systems Security: A Bystander Theory Perspective,” Inter- [email protected] • WWW.ISSA.ORG