The U.S. Postal Service recently suspended teleworking after a reported breach, yet I think there's an argument to be made that VPN connections are by and large very secure. In the event of an internal network breach, in what scenarios would there be a legitimate case to disallow VPN use for a period of time?
I believe VPN and related remote access technologies are great for connecting teleworkers. That said, secure VPN access is usually not the problem in these types of breaches. Instead, it's the broad lack of visibility and control that network and security admins and analysts have related to their networks.
For example, organizations with networks that fall victim to these attacks often have a shortcoming in one of three areas:
- Knowing what information (and users) are where
- Understanding the risks
- Doing something about it
If they weren't forced to, many organizations would go indefinitely without ever performing an information risk assessment. You can't secure what you don't acknowledge. It's easier to ignore the underlying basic security principles than to seek them out because once you've uncovered the issues, you have to do something about them or you'll be called out on your oversights by a savvy incident responder or lawyer. The "doing something about it" part involves people not having the proper technologies to prevent or at least detect such breaches, including:
- Proactive network alerting/monitoring
- Security information and event management
- Enterprise-wide password enforcement
- Proper advanced malware detection
- Network access control
- Data loss prevention
You can have all the security policies, procedures and standards you want around secure VPN access and teleworkers. However, unless and until you have a means to enforce everything through these types of technical controls, you're going to remain at risk.
Government agencies such as the USPS should be familiar with the concept of "trust but verify", but obviously they're losing the battle.
Just do the best you can; the more insight and information the better. Otherwise, you're blindly trusting that all is well on the network and it's often not.
Ask the Expert:
Have a question about network security? Send it via email today. (All questions are anonymous.)
Get pointed advice on encouraging safe teleworker wireless LAN use
Dig Deeper on Secure remote access
Related Q&A from Kevin Beaver
While most mobile platforms provide levels of security from mobile cryptojacking, IT must still be aware of the risks and procedures to address an ... Continue Reading
Android Oreo replaced the allow unknown sources setting with a new feature that enables users to selectively install unknown apps. Kevin Beaver ... Continue Reading
Equifax's Apache Struts vulnerability was an example of a scan not being read correctly. Kevin Beaver explains vulnerability scans and how issues can... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.