Book Demo!

For years companies have provided remote access for employees to work from home. Mobile phones, laptops, WiFi and cloud computing make it easy for employees to work anywhere. Here in the North East, it’s not unusual to have companies recommend that employees stay home and work during a bad snowstorm.

But this does not even compare to the challenges many companies face with the coronavirus. Andrew Hewitt, analyst at Forrester said in a ZDNet article, “CIOs should be helping their businesses prepare for increased remote working during the coronavirus outbreak.” Having a remote access strategy is an important part of business continuity.

With more companies announcing temporary work from home policies, now is the perfect time to test your company’s remote access strategies and make sure they are secure.

Understanding the Risk

Remote workers inherently increase your security risks by creating new entry points for malicious actors to execute malware, ransomware, phishing and brute force attacks. When remote workers use home and public networks, they are often not secure. This makes it easier for hackers to gain access through targeted phishing or malware attacks. IT departments have a harder time controlling and securing information when it’s accessed remotely.

To address remote access, companies can implement strong/rotating password policies, multi-factor authentication (MFA), VPNs and other identity management or IAM solutions. These can be great options for most employees. But what about privileged users such as system or IT admins? Or anyone else who requires privileged access to systems and sensitive information?

If a hacker is able to access a privileged account, they can access your most sensitive company data, move laterally through your business network, evade detection and cause serious damage to a business reputation and put you in violation of compliance regulations.

With 80% of breaches involving privileged accounts, it is critical that companies have secure remote access strategies in place for both regular and privileged users.

Securing Remote Access for Privileged users

Privileged access management software is designed to help companies manage and control who has access to and how they access privileged credentials. This includes remote access for employees (or partners) to cloud or network systems. For example, XTAM’s Remote Employee Gateway creates a security perimeter across hybrid IT environments and blocks malicious outsiders by forcing remote users to go through XTAM to access corporate systems. This provides added security that companies need when addressing remote access and privileged credentials.

PAM solutions offer additional benefits of session monitoring, video recording, and notifications required for auditing and compliance. Companies have greater control to set access policies. You can set parameters on the time of day, location (IP address), or days of the week. PAM software also offers easy integration with the leading MFA offerings such as RADIUS, DuoSecurity, Google Authenticator, and Yubikey

With PAM software you can implement the principle of least privilege and restrict access rights for privileged users, accounts, and computers/applications to only those resources/permissions required to perform their job effectively. When most of your workforce is accessing systems remotely, least privilege ensures people only have access to the systems they need and no more. PAM software also identifies inappropriate permissions, records each session for compliance and sends alerts should the software notices suspicious activity and even terminates a suspicious session.

As more companies consider their work from home options, one thing is clear. Remote workers and partners will need access to your network and accounts, including Windows, Unix, AWS or Azure Instances, Mainframes, Cisco and Juniper Network Devices, Websites or Web Management Portals, in order to maintain your business. Leveraging a PAM solution can provide secure remote access to your most sensitive systems, data, and information. Companies will have the confidence that their infrastructure remains secure while users are working from home or anywhere else in the world.

At Xton, our customers are leveraging the XTAM Remote Gateway today to lock down systems and provide secure access to privileged users. With XTAM our customers have a safe and secure remote access solution for workers. Contact us today to learn how XTAM can complement your remote access strategies.

Download a free trial of XTAM Remote Gateway and see how easy it is to secure remote access to your IT admins and privileged users.

Banner image by Business vector created by stories – www.freepik.com


Mark Klinchin

I am Co-Founder and CEO of Xton Technologies. I am interested in computers, software development, cyber security, content management, photography, image processing and mathematics.

Related Posts

Industry

Insider Abuse, Google and Privileged Users

Recent news reports found that Google fired dozens of employees from 2018 -2020 for abusing their access to company data. While insider abuse is not new, it is a growing threat and one that companies Read more…

Industry

Is the Healthcare Industry Doing Enough Around Cybersecurity?

Ransomware, phishing, and cyberattacks in the healthcare sector are increasing. In 2020, healthcare was a top industry targeted by cybercriminals. With the average cybersecurity attack costing $7 million, is your healthcare organization doing enough to Read more…

Industry

Improving OT Security

The Colonial Pipeline cyberattack brings operational technology/OT security strategies to the forefront. According to a CSO article, it’s the lack of visibility into the security status of OT systems likely forced the shutdown of their pipeline Read more…

Copyright © 2020 Xton Technologies, LLC. All rights reserved.