back to article COVID-19 security tips: Ensure you sack your staff without leaving their IT access enabled, says Secureworks

The global switch to remote working in early 2020 gave hackers a whole new set of juicy ransomware targets. Or so says Secureworks, which throughout 2020 has, perhaps counterintuitively, insisted there has been minimal uptick in cyber activity from malicious people, stating in its research The Effect of COVID-19 on Incident …

  1. Nunyabiznes

    Seems reasonable

    We have users connecting our devices to their (poorly or not secured) home WiFi. It is enough to give you gray (or no) hair. We are often accused of being paranoid about security here, but are we paranoid enough?

    1. Dan 55 Silver badge

      Re: Seems reasonable

      Well tell manglement not to be cheap and cough up for some Aruba APs.

    2. Doctor Syntax Silver badge

      Re: Seems reasonable

      "but are we paranoid enough?"

      If you're not your manglement will discover that the hard way. They won't blame themselves. Oh, no.

    3. Anonymous Coward Silver badge
      Pirate

      Re: Seems reasonable

      If you need to trust their home wifi, you're doing it wrong. You should assume that all channels between the endpoints are compromised and create a secure layer above them.

      1. big_D Silver badge

        Re: Seems reasonable

        True, but that company device still needs to connect to some form of network. If the home network already has one or more compromised devices on it, the company device can still get p4wn3d, even if you are running a closed tunnel VPN from the device for when it is connected to the office network

        A VPN is needed and helps, but you need to still make sure the device is safe from attack when it is in "strange" networks, regardless of your VPN settings.

        1. Anonymous Coward
          Anonymous Coward

          Re: Seems reasonable

          My latest set of paranoia is, I think user proof.

          The user logs in to a secured web page and after doing the 2FA login then selects an option to open the Remote Desktop via the web page on the firewall, and the firewall hosts the connect from the firewall to the server internally and just displays it to the user via web page.

          Even if the remote computer and network is utterly compromised the worst that can happen is that the information viewed on the screen can be stolen by screengrabs. No applications have any method of sending unauthorised data to the company network.

          The downside is that there is no possible integration with the local PC so local devices like printers can't be mapped across if you needed to do this.

          1. big_D Silver badge

            Re: Seems reasonable

            I hope you disable copy and paste between the local machine into the remote session.

          2. Cederic Silver badge

            Re: Seems reasonable

            My latest set of paranoia is, I think user proof.

            The user logs in to a secured web page and after doing the 2FA login

            ...their compromised system now has access to your network.

            <quote>the worst that can happen is that the information viewed on the screen can be stolen by screengrabs</quote>

            Oh please. I can live stream on Twitch anything my PC is doing, post it on Youtube, share it with Albanians living in Northern Cyprus and breach a dozen laws even if I only use your equipment.

            This security thing: tricky.

          3. Darkk

            Re: Seems reasonable

            If you use Remote Desktop Gateway server you can actually disable clipboard, printer and shares. I've tried using Fortigate's web-based RDP which does not support multi-monitors so had to build a Remote Desktop Gateway server and create policies. Then it connects to a real remote desktop server. The idea behind that is VPN client is not needed. They just use the gateway settings in Microsoft's native RDP client and boom you're in.

            I've set up restrictions to only allow access to certain resources and the remote desktop servers. So if the hackers tried using an account that does not have the permissions to access the RDP servers they won't be able to log in.

            I get it why you use your firewall's own SSL-VPN with RDP feature to limit your exposure to Microsoft servers to the internet. Sometimes it limits the users too much from what they need to do.

            QUOTE:

            "The downside is that there is no possible integration with the local PC so local devices like printers can't be mapped across if you needed to do this."

      2. Anonymous Coward
        Anonymous Coward

        Re: If you need to trust their home wifi, ...

        Wait, what? I thought my problem was that I don't trust my SO's employer's network, or the windows machines admin'ed by them, that are now on my home network :-)

  2. Doctor Syntax Silver badge

    Tip for those sacked

    Hope for better times for everyone including your ex-employer and remain on good terms to be at the front of the queue when they get back on their feet.

    1. Anonymous Coward
      Angel

      Re: Tip for those sacked

      True. Burning bridges is rarely a good strategy.

      OTOH, keeping an up to date backup of your data files and email apart from your work computer might not be a bad idea.

      1. big_D Silver badge

        Re: Tip for those sacked

        Keeping company data after you have left the company, however the relationship ended, is not a good idea. And personal data should never find its way onto a company owned device.

        1. Doctor Syntax Silver badge

          Re: Tip for those sacked

          Two conflicting points of view, both excellent in their own way.

          Some data is definitely hybrid. Any email from company to worker relevant to employment and copies of similar emails going the other way are both company and personal data. Depending on your relationship with your employer you may need your own copy. I'm sure it's a grey area of law. OTOH if the communication had been on paper there'd probably have been no question of the employee being forbidden to retain it.

          Then there's general knowledge - all those accumulated little code snippets or scripts that an employer expects an experienced techie to have at his finger tips. Does it all have to be in the head or can some of it be preserved in some other form? And I'm sure every old-school salesman had his little black book or card index which went with him from employer to employer. In either case the employer can't expect the leaver to be brainwashed.

    2. Danny 2

      Re: Tip for those sacked

      First time I was made redundant we were being called in one by one over the tannoy. An older, wiser worker told me to shake my managers hand and tell him what a pleasure it was working with him.

      "That'll make the bastard feel much worse".

  3. Eclectic Man Silver badge

    Macros

    In my previous employment at BT, the IT security team created a little button on MS Outlook that would send a selected e-mail to the anti-malware team, and delete it from your inbox. All you had to do was identify a suspect e-mail, select it and click the button. It worked very well, though I don't know the code they used, sounds like a good idea others should copy. Of course the users did have to recognise suspicious e-mails first (we had a training course for that too), but it was a start to taking IT Security seriously for the whole company, rather than just words like 'Security is everyone's responsibility', and suchlike.

    1. wyatt

      Re: Macros

      You can do this with M365, anything you submit as junk/phishing can go to an additional mailbox.

      1. Doctor Syntax Silver badge

        Re: Macros

        But is there an anti-malware team to check it. That's when you know the company is taking it seriously.

    2. Anonymous Coward
      Anonymous Coward

      Re: Macros

      I still despise some of the mandatory training they make us do on that.

      Especially when you over egally tell them just about everything on an email is suspicious but they say you're wrong and highlight only one of the 5 things you've listed.

      1. perlcat

        Re: Macros

        Your assumption about who training is actually for and what it actually does is as invalid as assuming HR is there to protect you. HR is there to protect the business from the employees, and training is to ensure that they have valid reasons to discipline/terminate, as you become accountable for the subject of the training. The training has no need to be connected to reality or education in any way, shape or form -- if there is unpleasantness, and you were at the bottom of it, they have proof in writing that you know better, and so they have a legit right to get rid of you. This, even if the actual training had absolutely nothing to do with the title of the course. If the course title is "Internet Security", and the instructions are simply how to make a bacon sandwich, you now are responsible for internet security in spite of the material presented -- and the training would actually be useful (for once). Did you *really* think a swarm of HR drones could make useful internet security training, anyway?

    3. big_D Silver badge

      Re: Macros

      Our users do that anyway.

      We've had a flood of phishing emails being forwarded from the users, asking if it is truly a phishing email. And I am glad they do, I'd rather deal with a dozen requests for confirmation every day than one incident of a user using their own initiative and reacting to a phishing email.

      We have seen an up-tick in malware attachments, generally in .doc or .xls files and those formats are automatically stripped from emails by policy, regardless of whether they are infected or not. Some users complain that they aren't getting information from suppliers or customers, but we are hard and ask them to inform the other party that file formats that have been declared dangerous for over a decade will not arrive and they should use more modern formats that are less* vulnerable.

      * I don't think any format is 100% safe, you can just try and minimize the chances of compromise.

      1. Anonymous Coward
        Facepalm

        Re: Macros

        " I'd rather deal with a dozen requests for confirmation every day than one incident of a user using their own initiative and reacting to a phishing email."

        Agree 100% - sadly I've had a few examples recently where they've forwarded an email to us asking if it's a phishing email, we've confirmed it is and the had the reply back "Oh -I clicked on it does it matter?"

        Fortunately other things have managed to protect them from doing this so far, but I'm aware that it's only a matter of time before something goes badly wrong.

      2. David Hicklin Bronze badge

        Re: Macros

        "generally in .doc or .xls files and those formats are automatically stripped from emails by policy"

        how do you handle double zipped password protected files ?

        1. Robert Carnegie Silver badge

          Re: Macros

          Kittens_Video.zip.xlsx

          I'm not sure what point I'm making but I wanted to join in.

          I think our shop just blocks zip files as well but I haven't checked lately.

        2. big_D Silver badge

          Re: Macros

          Stripped by policy. No archives, no executables, no old Office formats, plus a bunch of others.

  4. Anonymous Coward
    Anonymous Coward

    Simples, don't use 5G for work connections and this will no longer be a problem.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like