Contact Us
back

Remote Workers Can Compromise Your Communications Network

Published On: 
Apr 13, 2020

Barbara M. Hunt

Founder and Chief Executive Officer
145 Views    10 Comments

Barbara Hunt

Founder and CEO, NetAbstraction
Anonymous Web Browser
Network Security
Virtualized Network

It is a strange new world for most businesses. More workers than ever are working remotely from home…across all industries, and products and solutions. Examples of the effects of this new reality are in the news daily.

·        “How to Secure Zoom Video Conferences, Work From Home Collaboration”: Read More

·        “Coronavirus: Its Four Most Prevalent Cyber Threats”: Read More

·        “Corona virus challenges remote networking”: Read More

While businesses are scrambling to address the current crisis, and keep their communications and data safe, they should also be looking at the long-term effects of managing an online workforce that will be exposing their network security. Will there be a permanent paradigm shift? Even as some workers go back to reporting to offices and other work locations, will there still be a significant number who choose to work from home?

Networks and cloud infrastructures were already straining under increased cyber vulnerabilities and attacks.

(See NetAbstraction blogs: “Cloud Vulnerabilities” and“Network Vulnerabilities”.)

Best practices suggested in the recent past are still valid now:

  • Use a low-profile surrogate identity to subscribe for network services and especially for cloud hosting of your sensitive data.
  • Isolate and disguise your network within the overall cloud environment so that it is not as apparent to APTs that may be lingering in-wait.
  • Utilize more than one cloud to make it more difficult for an APT in one environment to “hop” and follow your activity.  
  • Don’t be a static network. If you shift and move, APTs can’t easily map your location and then simply sit in-wait to steal and collate your data.
  • Be proactive, not reactive. Disguise and protect your network before you become the target of an APT.

Enterprises need to look beyond their current configurations and reactionary processes.

NetAbstraction is unique in that the company provides a proactive foundation for smart enterprise privacy. By transparently distributing network communications within and across multiple clouds, and regularly churning the underlying network infrastructure, NetAbstraction effectively hides your enterprise’s network.

The dynamic shifting of communications across multiple commercial providers and use of multi-hop transport, make actual user information, origin location and identities a nearly impossible target to find for hackers, search engine optimization companies and other privacy threats.

 Enterprises must start thinking about their networks proactively instead of reactively, and consider reducing their “network risk insurance”costs.

NetAbstraction can help with network and cloud security options now and in the future with a Malware-Protected Browser for both remote and onsite workers, and a Wi-Fi Hotspot device for remote workers.

“If they can’t find you…they can’t attack you.”

Featured Blogs

Corey Williams | Vice President, Marketing

CrowdStrike Becomes a Publicly Traded Company

June 12, 2019 - 5 mins
Corey Williams | Vice President, Marketing

CrowdStrike Becomes a Publicly Traded Company

June 12, 2019 - 5 mins
Corey Williams | Vice President, Marketing

CrowdStrike Becomes a Publicly Traded Company

June 12, 2019 - 5 mins
Corey Williams | Vice President, Marketing

CrowdStrike Becomes a Publicly Traded Company

June 12, 2019 - 5 mins
Related Content
Your title content goes here

It is a long established fact that a reader will be distracted by the readable.

Read More
Your title content goes here

It is a long established fact that a reader will be distracted by the readable.

Read More
Your title content goes here

It is a long established fact that a reader will be distracted by the readable.

Read More

Ad Space

Barbara Hunt

Founder and CEO, NetAbstraction

Barbara is a recognized expert in information and telecommunications technology and operations, based on her extensive experience in the Intelligence Community (IC). She is a sought-after speaker and presenter in the cyber communications market.

Related Content
Zoom admits calls got 'mistakenly' routed through China

During spells of heavy traffic, the video-conferencing service shifts traffic to the nearest data center with the largest available capacity.

READ MORE
Coronavirus: Its Four Most Prevalent Cyber Threats

With more countries taking measures to contain the coronavirus and more organizations asking employees to work remotely from home whenever possible, the digitalization of the workplace is accelerating prematurely.

READ MORE
Coronavirus challenges remote networking

COVID-19 sends IBM, Google, Amazon, AT&T, Cisco, Apple and others scrambling to securely support an enormous rise in teleworkers, and puts stress on remote-access networks.

READ MORE

Subscribe

Sign up for the latest posts and updates from NetAbstraction.

Subscribe

Related Blogs

Category
Best practices for Mobile Device Security

This article appeared in Security Brief, New Zealand and is republished here with their permission.Mobile phones have a huge impact on the day-to-day lives and the way one communicates with the world.

Read More
Category
Watch Compelling Keynotes and Sessions from the Fal.Con for Public Sector Conference

rowdStrike’s first Fal.Con for Public Sector cybersecurity conference — held last week at the new International Spy Museum in Washington D.C. — brought together.

Read More
Category
ITProPortal: CrowdStrike Discusses Life Beyond Malware

This article, “Life Beyond Malware,” originally appeared on ITProPortal and is published here with their permission.

Read More
2020
NetAbstraction