JustPaste.it

New attacks on remote devices

Jim Boehm, Expert Partner at McKinsey & Co. Consulting, anticipates new attacks focusing on remote office devices that are now handling much more sensitive data than before Covid. For example, on a customer site where their team recently worked, they discovered VPN protocols based more on continuity of work than on security protections.

 

Know more: Managed UPS Services

 

This company has configured the VPN so that, if the connection is broken, it will retain some "basic functionality", such as reconnecting to WebEx. "It would still send internal emails if the email client had been connected to the VPN [before disconnection]," he says. "WebEx sessions would automatically reinstate and transfer data.

 

When VPNs are responsible for 10% or less of all data transmissions, a company may consider this an acceptable risk. Now that VPNs are responsible for more than 90% of all data transmissions, CISOs need to reevaluate.

 

Information Technology Technicians assist employees of organizations by helping them install and configure system software and hardware. They offer system and operations support to the personnel on a daily basis.

 

Boehm adds that, in some years, VPNs may no longer be needed, but much needs to happen before that happens. "In a completely  zero-trust world , you can get rid of VPNs," he says. "Today, nobody really has zero confidence, except in Google."