Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Four ways to stop cybercriminals from capitalizing on your remote workers

By Shena Tharnish
remote-enews
September 28, 2020

Cybercriminals love a crisis. As most of the workforce continues operating remotely, it’s imperative that businesses secure network connections to protect their customers, employees and assets from those taking advantage of the pandemic. Security leaders must evaluate how to keep employees productive and provide them access to company resources without opening themselves up to increased risk. The reality is many supported devices are not using secure private networks, but instead residential Internet to do their jobs.

Cybersecurity professionals must stave off almost constant attempts to breach network security in normal times, but during this global crisis, security leaders have seen a 300% increase in cyberattacks.

Although these hackers are using the same approaches (think: phishing, spoofing, distributed denial of service (DDoS), malware, and other malicious attacks) cybercriminals are attacking at a much larger scale. On a typical day, DDoS attacks have increased by 33% since the onset of the pandemic.

The efforts from cybercriminals continue to multiply exponentially as they seek to expose technical vulnerabilities and play on people’s emotions.

 

Cybercriminals prey on the vulnerable

Unfortunately, when many people were handling the implications of COVID-19 and transitioning to a remote workforce, cybercriminals started working harder. While private business networks enable more control to stop attacks in their tracks, the residential internet that the vast majority of remote workers rely upon provides new challenges. Now is not the time for organizations to let their guard down. They simply cannot assume that all endpoints accessing their networks are safe.

While the types of attacks haven’t changed, the volume of attempts is drastically increasing, particularly those that hope to exploit the vulnerabilities of people and the networks and devices they are using to do work. Phishing and spoofing efforts have increased and attackers are using terms like “COVID,” “coronavirus,” “test kits,” and “vaccine” to lure people to click on links and visit websites. Once on the site, malware and ransomware could download to a device - later connecting to and infecting the broader company network.

IT security leaders can protect personnel and environments by educating employees on what to avoid in emails and other communications, and by boosting security measures on the devices being used and the connections between remote employees and corporate networks.

So how can you stop cybercriminals from exploiting your business? Here are four secure ways to manage a distributed workforce:

 

1. Deploy secure virtual private network (vpn) connections

By providing a VPN tunnel on either end of a connection between a residence and company assets, IT security pros can lessen the threat posed by devices connecting to their private network via the public Internet. This secure connection also provides visibility into the devices connected to the environment and can enable patching for security threats on distributed devices.

 

2. Create a zero-trust security model

A zero-trust framework assumes no trust in a network, device, or identity and requires those accessing resources to prove who they are. Zero trust also leverages identity and access management technologies to assign appropriate access permissions to everyone in the organization. For instance, an employee working in marketing wouldn’t need access to sensitive financial information used by someone in accounting.

 

3. Require multi-factor authentication

Two-factor authentication is a subset of multi-factor authentication, which requires more than two pieces of evidence to authenticate that a person is who they say they are when logging in. For instance, some access requires entering a code sent to a specific user’s device after entering their username and password. By enabling multi-factor authentication, employers are able to prevent unwanted access, even after a hacker has obtained a user’s username and password.

 

4. Scale up virtual desktop infrastructure

If the devices being used for work cannot be trusted, companies can use a virtual desktop infrastructure (VDI) to provide the needed resources to get work done without exposing the underlying network to the threats posed by unsecured devices. VDI, often available via cloud-based offerings, renders an image and doesn’t download actual data to the device, blocking off unnecessary access.

 

New challenges require new thinking and new solutions

COVID-19 forced many business leaders to consider how they would support and now secure a vastly remote workforce that is sensitive and vulnerable to malicious attacks and social engineering.

Overcoming the security gaps of a remote workforce will require rethinking security approaches, and IT security professionals can prevent problems by educating end users on the dangers. Securing remote-working arrangements are essential to ensure the continuity of operations during this time.  As more companies continue to keep their employees at home, the businesses that adopt security solutions will be best positioned to face cyber attacks.

Security leaders will need to build out their secure infrastructure to enable secure connectivity and access, to ultimately allow employees work from anywhere without worry. This is a stressful time given the uncertainties, but it’s also a time to reflect and determine new cybersecurity solutions to provide for remote workers.

KEYWORDS: COVID-19 cyber security information security remote workers risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Shena tharnish

Shena Seneca Tharnish is VP of Cybersecurity and Practices for Comcast Business Services. She joined after serving as SVP, Enterprise Network Infrastructure at PNC Bank for five years in Pittsburgh, PA, and as a senior leader at The Home Depot, Inc. for twelve years in Atlanta, GA. Shena has over 24 years of experience in Information Technology – leading and managing network engineering and application development services.  Prior to joining The Home Depot, Tharnish worked as a network consultant with carriers MCI WorldCom and Concert Communications (BT/AT&T), designing wide area networks for businesses. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • convergence freepik

    Four ways SMBs can protect themselves from cybersecurity threats

    See More
  • SEC1019-career-Feat-slide1_900px

    As Cyber Attacks Become More Prevalent, Here’s Why Your Small Business is at Risk

    See More
  • employees working at a table

    How to help employees spot and avoid phishing attacks

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing