Recalibrate Insider Threat Controls When Your Employees Are Off the Corporate Network

Recalibrate Insider Threat Controls When Your Employees Are Off the Corporate Network

In recent years, remote work has become a growing trend. In 2018, however, only 3.6 percent of Americans worked entirely remotely. Due to changes in the global climate, many employers have shifted their workforces to remote work if their jobs can support it. With the sudden expansion of work-from-home and remote-work practices, chief information security officers (CISOs) need to adjust their security programs to cope with the rapid shift in the IT estate away from the corporate network.


What was once a small percentage of the workforce is now much more significant, and security teams need to make adjustments to their controls to adapt to this new way of working. We’ve recently explored how security teams can enable remote workers to collaborate securely, but another area to consider is how to extend the reach of the security operations center (SOC) to cover endpoints outside of the traditional perimeter.


Intercept Threats at the Perimeter


To effectively secure remote employees, teams must better understand their distinct behavior and its implications in insider threat detection. CISOs must be able to answer the following questions:


How can you verify the person logging into the corporate virtual private network (VPN) is the employee, not an attacker using stolen credentials?
How can you verify an employee’s anomalous behavior isn’t a result of working remotely?
How can you help secure employees connecting to open and unsecured internet locations, such as coffee shops?

By better understanding the behaviors of remote workers, teams can focus on detecting anomalous behavior that could signal credential compromise or malicious intent. These behaviors can often be detected at the VPN boundary before potential damage can be done. On the perimeter, CISOs should determine if their ..

Support the originator by clicking the read the rest link below.