Many exploits, however, take advantage of those who do not change their home router default passwords, so this...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
should be one of the first things that's addressed if the enterprise is provisioning users' home routers, along with other insecure default settings. Minimally, be sure to securely configure the equipment you provide users and offer guidance or direct them to external resources on how to secure their home network if they are using their own equipment to access the enterprise network.
The bigger question is how to secure the computer that is in use at home and the connection between the computer and the enterprise network. You may want to assume that the local network or any network is hostile, and configure users' computers and remote connections to be resilient to attacks by using a host-based firewall and verifying that connections to your network are secure. Even if securing the home network is a losing battle, the most important points are to configure your computers securely, provide secure remote access to your enterprise network by using a VPN or similar technologies, and educate your users with basic information security skills to help prevent serious security issues.
Dig Deeper on Secure Remote Access
Related Q&A from Nick Lewis
Locky ransomware has borrowed features from Dridex malware, which focused on attacking banks. Expert Nick Lewis explains Locky's techniques and how ...continue reading
The Mazar malware can wipe an entire Android device once it has been installed. Expert Nick Lewis explains how this malware works, and how attacks ...continue reading
MouseJack, a wireless mouse and keyboard security flaw, allows attackers to type malicious commands. Expert Nick Lewis explains how enterprises can ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.