Site icon Secplicity – Security Simplified

Security for Users on the Go, without the Extra Baggage

Mark likes to return customer emails from his local coffee shop, Jennifer considers a plane her second office, and Tim – well, sometimes Tim has to respond to that urgent request in the wee hours of the morning, no matter where he is. The days where everything was contained within your secure network perimeter are gone. Business today happens on the go.

There are more business-owned laptops accessing the Internet from outside networks than ever before, with Gartner predicting the average company will see 25% of its traffic bypass their network perimeter entirely by the year 2021.[1] Cloud applications are now integral to business processes, allowing users to connect directly to the application, anywhere in the world. People are working from the places they find the most comfortable and convenient, and businesses are reaping the benefits of higher productivity, reduced attrition, and significant cost savings.[2] The benefits of a mobile workforce are numerous, but as more work occurs off-network you lose visibility and protection over the weakest link in security; users.

With 90% of cyber attacks starting with a phish, users are THE prime target. And, users are even more vulnerable to these type of attacks when they are outside of your perimeter. When off-network, they not only lack core security protections, they are often using their devices in uncontrolled environments rife with unsecured Wi-Fi networks, and full of distraction. 81% of businesses have experienced Wi-Fi related security incidents that have compromised their mobile employees.[3] 64% of midsize businesses report instances of employee-issued laptops becoming infected with malware while off of the corporate network.

In the past, securing a remote workforce required back-hauling traffic from branch offices and mandating VPN use to keep users safe. As more work moves off-network this process becomes complex to administer, and unnecessarily cumbersome for the average user. To make matters worse, users will often skip the VPN entirely when performing personal tasks or connecting directly to Cloud applications, leaving them unprotected anyway.

Keeping up with this fast-paced new reality requires a lightweight, always-on approach to security that not only delivers protection, but also provides visibility when your user visits a risky place on the Internet – no matter where they are in the physical world. Thankfully, the Doman Name System (DNS) makes this possible.

Protecting Users at the DNS-Level

DNS is the backbone of the Internet, functioning as the de facto phone book that translates domain names into IP addresses. DNS allows the average user to navigate to google.com instead of entering a numerical IP address. DNS is almost always the first step in the process of connecting to the Internet and is used by nearly every device that needs a connection. It is also one of the tools of choice for hackers who fool users and redirect traffic to malicious servers by spoofing the DNS record of legitimate sites.

As a first line of defense, inspecting each DNS request to determine which are malicious and which are legitimate can prevent a user’s risky click from turning into a major security incident. There are many DNS-filtering tools available, but not all are created equal.

Here are some things to consider when sourcing DNS security:

Want to learn more about how to secure your users on the go? Join my webinar, Hacked on PTO: No Vacation from Vulnerability, on August 28, 2019 at 8:00-8:30 am PDT or at 3:00-3:30 pm GMT

[1] https://www.gartner.com/smarterwithgartner/five-steps-to-closingsaas-security-gaps-2/

[2] https://www.inc.com/scott-mautz/a-2-year-stanford-study-shows-astonishing-productivity-boost-of-working-from-home.html

[3] https://www.globalsign.com/en/blog/are-your-mobile-employees-your-biggest-security-threat/

Exit mobile version