Share this post
This is some text inside of a div block.
Copied!
Back to all posts
We’ve put together tips to help organizations identify cybersecurity gaps when using a VPN.
Published on
October 1, 2020
71% of Canadian organizations have reported experiencing at least one cyber attack that impacted operations in some way.
You’ve seen the headlines. Data breaches here, phishing attacks there. It seems we’re always hearing about some company or organization that’s been the unwilling victim of a hacker’s latest conquest (CRA credential-stuffing attack, anyone?).
As an IT professional, your ultimate goal is to naturally avoid headlines such as these at all costs.
Yet, depending on your role within IT (i.e. whether you work for or provide services to an organization), you’ve most likely seen some close calls. Perhaps you’ve even been on the other end of an eleventh hour cybersecurity hack that you had to resolve.
But here’s the thing; how, in 2020, are companies still so vulnerable to attack?
More importantly, how do companies become better at leveraging IT within their organizations to protect their systems, their people (i.e. staff, clients, customers), and their reputations? To answer these questions and provide us with the ultimate IT insider’s perspective, we called on two experts: Enzo Logozzo of 365 iT SOLUTIONS and Sean Jennings of CIM Solutions.
When COVID hit, many companies didn’t have secure methods in place to accommodate staff for remote access. Since the seismic shift from ‘work office’ to ‘home office’ happened so quickly, a number of businesses opted to set up their staff through a VPN.
But here’s the thing, an improperly configured VPN can be a significant security risk.
Sean Jennings of CIM Solutions explains why: “The issue with employees using a VPN when working from home is that it opens up the office network to attack from their home network. This is because the person working from home isn’t using their computer or internet strictly for work purposes. They’re probably streaming movies in the evenings and on weekends. The kids are downloading games, music, and who knows what else. Everyone in the household is clicking on dozens, even hundreds of links. And all are completely oblivious to the fact they’ve most likely clicked on something that has opened the door to a hacker. If that’s the case, you can bet any home computer is infected with some kind of malware or hacking tool.”
This is where remote staff unwittingly set the stage for a horizontal/lateral attack.
According to Sean, that’s because most computers have reduced security and firewall policies when connected on a trusted (i.e. ‘home’) network. The moment a home-worker connects to the VPN, they’ve just provided wide-open access for anyone to slide right behind the firewall, using Joe or Jane’s computer as the gateway. Nothing gets filtered. Nothing gets blocked. Cybercriminals can just spend the entire day hacking corporate computers and servers to their heart’s content. All while intercepting any company data flowing in between.