top of page
Search
  • Writer's pictureDeepthi Rao

How robust is the security firewall with WFH

With many companies adopting to Work From Home model, security firewall needs to be robust both at gateway and end point level.


McAfee, pioneers in Cyber security said that it saw an average of 419 new threats per minute as overall new malware samples grew by 11.5 per cent in the second quarter of this year. McAfee saw a 605 per cent increase in Covid-19-related cyberattack detections compared to the first quarter. The cybersecurity company observed nearly 7.5 million external attacks on cloud user accounts.


The different attacks, range from attackers targeting the World Health Organization (WHO) to steal information to mass phishing email and spam campaigns targeting remote workers. There are even cases where cybercriminals are launching websites with domain names related to Coronavirus and COVID-19, exploiting people’s curiosity or worry to eventually launch ransomware attacks.


Bruce Schneier, a leading encryption researcher, writer, and security consultant said that company data will be at risk as long as it is stored in the database. Hence the best solution would be to retreive only important information they really need, encrypt it, and to quickly delete it from their company's servers.

Upgrad, says that data can be protected by preventing cloud leaks and making the data more secure. When cloud data gets leaked, data is being retrieved by Google and exposed to the Internet. Though Amazon Web Services secures S3 buckets by default, its is believed that S3 security is flawed by design and most people have poorly configured S3 permissions.

Even Azure, Google Cloud Platform (GCP) and GitHub have had data leaks in the past.


Tirthankar Dutta, CISO at Info Edge says "With the increasing number of breaches and the availability of credentials on the dark-net, credential stuffing attacks are at an all-time high in the Covid era with many organisations falling victim to it".


The solution to these problems is to use intelligent and automated software that quickly finds, diagnoses, and fixes problems without placing a strain on the network. Innovative cloud-based solutions can enable secure content distribution with incredible speed and scale, requiring nothing more than an internet connection. This can be achieved by harnessing split-tunnel VPN architecture, making it possible for endpoints to get content directly from other internet-facing computers or from a content delivery network (CDN), such as Azure CDN. Thus reducing the risk of a data leak.

These types of solutions enable organizations to rapidly respond to security breaches and vulnerabilities, patrol and enforce configuration management policy, and maintain Windows operating system (OS) safe and free from attacks.




22 views1 comment

Recent Posts

See All
Post: Blog2 Post
bottom of page