Site icon TechSling Weblog

With Employees Working from Home, Zero-Trust Network Access is the Only Thing that Makes Sense

COVID-19 has employees in nearly every industry stuck working from home – which presents unique dangers in terms of information security. With traditional remote access approaches such as basic RDP and VPN solutions proving increasingly vulnerable to hackers, security experts are exploring Zero Trust approaches to achieving the security they need.

New Dangers are Overwhelming Old Protections

VPN has always been a popular solution for users that need to work from home, but there are many things working against it in the era of Coronavirus. For one thing, although these systems are designed to support remote workers, most VPNs were not set up to enable every employee to work from home at once. In fact, most typical VPN deployments are architected to support as little as 20 percent of a company’s workforce. Therefore, it is critical to rapidly scale up VPN capacity in order for the system to work as designed – but that’s not the only problem.

VPN only protects a single channel of communication – from a user’s endpoint to a corporate server. If the VPN is set up in a split-tunnel mode to improve capacity management and bandwidth, the channel between a user’s computer and the public internet remains unprotected. That means that it’s still possible for malware to infect the endpoint via a drive-by-download or a phishing email. 

Once an infected endpoint connects with a VPN, whoever controls that malware has access to everything that the user can see. What’s more, there’s been a new surge in malware designed to infect home users and attack corporate networks, most linked to the novel Coronavirus.

Some of this malware can move from the infected computer into the network once the device reestablishes its connection with the office via the VPN. Once on the network, attackers typically have little trouble accessing critical information. Networks are notorious for substandard segmentation and overly broad access permissions, and attackers take advantage of that once they penetrate the network. 

The network designers of a previous era tended to assume that if a device was owned by an authorized user and registered with the LAN, it could be granted the same permissions on both the LAN and the VPN. Unfortunately, many users don’t have the same protections when working from home as they do at the office. Their home networks and commercial-grade infrastructure don’t offer much defense against determined hackers. Instead, you need to assume that the devices connecting to your VPN may be compromised and then act accordingly – taking a Zero Trust network approach.

Protecting Against Compromised Home Users with Zero-Trust Network Access (ZTNA)

To apply the concept of Zero Trust to a network, organizations use an assortment of technologies and policies to divide networks into much smaller and more tightly regulated micro-segments compared to traditional VPNs or even LANs. Access to any given microsegment is granted — or not — based on a much more granular list of criteria, and access to the web is done in a way that completely isolated the endpoint from any potential threats.

Some technologies behind Zero Trust Network Access and Zero Trust web access might include:

Zero-Trust Network Access makes VPNs more secure and better suited to working from home. When delivered from the cloud, it can be provided to users working from anywhere, configured from a single centralized management panel, and then scaled to cover all workers as necessity dictates. If you need security solutions to cover workers under lockdown, ZTNA is the way you should go.

Gerry Grealish is Chief Marketing Officer at Ericom Software

Exit mobile version