Remote workers a security risk? Join us for an industry experts webinar!

Join us for a Panel Discussion with Industry Experts

Are Remote Workers a Security risk?
Sign up for our LIVE WEBINAR and hear from industry experts discussing what they’re seeing and their recommendations.

Industry experts from:

Microsoft
Citrix
Fortinet
Sophos
KnowBe4

This interactive webinar will give the audience an opportunity to hear how to overcome some of the most serious challenges and risks of a workforce having remote access into the corporate environment. There will be a Q&A at the end where you may run your questions and concerns past the panel of experts.

Tuesday, April 21st Agenda

Don’t miss this event! Sign up below!

[wpforms id=”3523″ title=”false” description=”false”]

Giving Back in Tough Times: Free Services Available During COVID-19

As businesses try to navigate and adjust during this difficult time, we here at Right Hand aim to provide value by offering 3 key complimentary services, including productivity monitoring, PC monitoring and maintenance, and security training.

COVID19 Free Services - Our way of giving back

Employee Productivity Monitoring (Free for 30 days)

  1. Track hours logged in.
  2. Track hours active
  3. Track Productive/Non-Productive time.
  4. Rank employees by productivity
  5. Receive Reports automatically
  6. Take a deep dive into the portal to understand where time is being spent
  7. Optional features:
    • Screenshotting (Continous, Based on Keywords, Based on Activity/Application)
    • Alerting
    • Webfiltering
    • Block Applications
    • Data Loss Prevention
    • End point lock down

COVID19 Free Services - Our way of giving back

COVID19 Free Services - Our way of giving back

 

Remote Worker PC Monitoring and Maintenance (Free for 30 days)

  1. Monitor Antivirus (status, is it installed, is it working)
  2. Monitor Patching (are patches up to date)
  3. Inventory Hardware/Software
    • Is hardware making your employees unproductive”
    • Are there insecure programs installed?
  4. Optional features
    • Ongoing patch installation
    • Antivirus Software
    • End User Support

 

Free Training (COVID-19)

In this free training module we help you understand the challenges and how to stay safe and secure online while working from home.

Internet Security When You Work From Home

By the end of this training module, you will:

  1. Understand some common technology problems when preparing to work from home.
  2. Understand basic necessary steps to take while preparing and securing your home environment for remote work.
  3. Know essential best practices to implement for success while working remotely.

Please fill out this form to get more information:

Error: Contact form not found.

Work From Home Security: How Secure is Your VPN from Hackers?

Work from Home Security–Is Your VPN Letting the Hackers In?

Work from Home Security - Is your VPN Letting Hackers in?

In the haste of the rapid changes coming down from government agencies, everyone who could work from home spent the last week or two getting their remote functionality set up.

While this was necessary, the last thing most people were thinking about was the potential security implications.  Even though security may have been a thought, while quickly trying to think about how to handle everything else, it more than likely did not get the full attention it requires.

Now that we are past the initial shock and starting to work full-time from home, we wanted to put together some security posts to help organizations better secure their networks in this new environment.  In these unusual circumstances, hackers always try to take advantage.

First, let’s talk about VPNs.  They are incredibly useful tools if secured properly.  Unfortunately, there have already been news stories about hackers targeting VPNs.  What are they targeting?  The answer is improperly configured and unpatched VPNs.

With that in mind, do you maintain and keep your firewalls up-to-date? The first step if you aren’t sure is to determine if your firewall and/or VPN appliances are up-to-date on firmware.  Your IT engineers should be patching the hardware on at least a monthly basis, and sometimes even sooner if a critical update is available.

The next question to consider is whether you have configured the VPN properly. There are a few different ways to configure traffic on a client-to-site VPN.  One option is to configure split tunneling, which is a way to only send network traffic specifically destined for the work network through the VPN.  The other option is the opposite: all traffic goes through the VPN.

On the surface, split-tunneling sounds like the way to go.  You do not want your employees personal web surfing to go through your network.  What if they are streaming music while working? That seems like a bandwidth nightmare, right?

The problem with split-tunneling is that your employee’s computer becomes a gateway into your network.  The employee could accidentally browse a malicious site via their home network which does not have any web filtering, causing that computer to become infected. Since the computer is connected to the VPN, that malware can enable hackers to access your business network by allowing them to enter through the employee’s home internet.

What about the problem of bandwidth?  With the alternative, it is true you will use more bandwidth, but you have control over that bandwidth and, more importantly, the traffic.  If you are concerned about music and video streaming, you can block that traffic from the VPN. After all, your employees are working from home.  They could turn on the TV or radio.

You can also turn on web filtering, antivirus scans, intrusion detection and other firewall services to scan all traffic.

This way, the VPN will force all traffic to go through it. Any other devices on the home network will not be able to communicate with the laptop – the Xbox, Alexa, Google devices, etc.  It will be in a quarantine of sorts.  This dramatically improves security and will limit the exposure of your internal business network.

Finally, you should limit the type of traffic that can go through the VPN.  If most of the traffic is just web traffic, only allow web traffic.  If it’s a database application on your network, you can limit traffic to that database. List everything users need to access and implement access control policies to allow only that traffic.

As always, if you have questions about VPNs or are unsure about your security, reach out to us without hesitation. We are here to help.

Stay tuned for more security information to keep your business secure while your employees are working from home.