Four walls, a sea of cubicles and the rest of the traditional office accoutrements are no longer standard in the working world. The number of innovative co-working spaces continues to rise around the world, and this doesn’t even include coffee shops, libraries and numerous other public places that offer free Wi-Fi. That means that your staff can be very mobile and work from just about anywhere.

It’s important to consider the security implications of what these itinerant workers are doing. IT managers are challenged to keep their networks and data secure while encouraging remote workers to be productive, whether they’re dialing in from the local WeWork or reviewing emails at McDonald’s.

Examine Your VPN

First and foremost, IT managers must consider the company’s virtual private network (VPN) technology and usage policy. Ensure that the VPN can support not only traditional PC endpoints, but also tablets and smartphones. It’s important to protect all business traffic from outsiders, whether that’s the person sitting next to you in a co-working space to an insider eavesdropping over the network to capture corporate secrets or login identities. If you haven’t examined VPNs for several years, it might make sense to review your provider and examine the latest versions from Cisco, Watchguard, Check Point, SonicWall, Juniper and others.

Speaking of eavesdropping, you might also want to equip your remote staff with plastic screen protectors that limit the field of view. Given how closely packed many of us are on planes and in coffee shops, this is a smart preventative measure.

Connecting Securely From Co-Working Spaces

If you are supporting a mixed bag of different remote endpoint devices, it might make sense to consider using virtual desktops to provide a unified collection of Windows endpoints. This is particularly true if you are supporting many Windows-based applications.

In addition, you should review your corporate password policy to make sure you have support for more complex passwords and use of multifactor authentication. Also consider using single sign-on (SSO) tools to automate and improve access to various network and online resources.

Finally, ensure that your remote workers understand how to connect properly from co-working spaces. Provide appropriate training materials that demonstrate the consequences of using open Wi-Fi networks and falling for phishing schemes.

More from Application Security

X-Force Identifies Vulnerability in IoT Platform

4 min read - The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a lot of discussion around the security of IoT devices themselves, there is far less conversation around the security of the platforms these devices connect with.…

4 min read

Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours

12 min read - ‘Patch Tuesday, Exploit Wednesday’ is an old hacker adage that refers to the weaponization of vulnerabilities the day after monthly security patches become publicly available. As security improves and exploit mitigations become more sophisticated, the amount of research and development required to craft a weaponized exploit has increased. This is especially relevant for memory corruption vulnerabilities.Figure 1 — Exploitation timelineHowever, with the addition of new features (and memory-unsafe C code) in the Windows 11 kernel, ripe new attack surfaces can…

12 min read

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

4 min read - Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

4 min read

Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers

17 min read - Overview In this post, IBM Security X-Force Red offensive hackers analyze how attackers, with elevated privileges, can use their access to stage Windows Kernel post-exploitation capabilities. Over the last few years, public accounts have increasingly shown that less sophisticated attackers are using this technique to achieve their objectives. It is therefore important that we put a spotlight on this capability and learn more about its potential impact. Specifically, in this post, we will evaluate how Kernel post-exploitation can be used…

17 min read