I can still recall my first days in 1993 as a network admin, working with basic issues of networking and the hair-in-computer-fan complexity of muxing voice and data onto PSTN. Fast forward a few decades, and the world’s different, massively. Since you witness the Slammer worm slam through the networks to running my own security outfit now, P J Networks Pvt Ltd, these transitions have taught me one ugly truth: remote work security ain’t merely slapping a VPN on it anymore. So. At my desk after third coffee (there it is, the magic number) and let’s talk about making the remote and hybrid work models permanent — do it the right way, not as a half-baked, check-the-box solution.
Here’s the thing — remote work has been an afterthought, a perk. Now, it’s an expectation, and boy, is it a headache if you’re not watching. Users, in cities and countries around the world, or on their couch — everyone is an endpoint, an entry point. Your network perimeter? It’s dissolved. It’s what some people call perimeter-less, but I think it’s an invitation to hackers unless you’re ready.
Challenges include:
VPNs? Vital, sure. But a VPN is just a tunnel. The traffic is still originating from potentially compromised endpoints. And believe me, I’ve watched plenty of “secured” tunnels in the early 2000s turn into a back door for worms and trojans because of lame endpoints.
Endpoint security is to preparing assests before cooking, perhaps if your raw assets are spoiled, you won’t have a great meal. It’s not just home devices that are used for work that require trust levels verified at all times.
Strategies:
I recently assisted three banks upgrade their zero-trust architecture and I can tell you, this wasn’t a one and done roll out. It’s iterative. And demands patience when your users start to grumble about having to update things out of nowhere in the middle of a workday.
Alright, let me take a rant here—too many companies rely on VPNs and believe it’s a one size fit all solution for all communications. Nah.
Multiple layers are needed.
In the case of remote teams, encrypted messaging apps (and not all were created equally—do your research) and secure VoIP solutions can and will save your company’s bacon.
Think of the last corporate chat you had — was that end-to-end encrypted? For if not, someone might be listening in.
We can compare it to a recipe, if endpoint security is the ingredients and communication the kitchen setup then IAM is the recipe. It makes certain that only the correct people have the correct access, at the correct times.
Some essentials:
Quick divergence – password policies. I’ve seen companies impose such stupid rules that users wind up writing passwords on Post-Its. Cease chasing complexity for its own sake. Instead use length and passphrases. Believe me a long pass phrase would trump 8 characters, 1 upper and 1 symbol any day of the week.
Never mind the legacy tools that presuppose the existence of a static corporate network. Watching over distant landscapes calls for different tactics.
In the bank projects I discussed security monitoring was able to detect nefarious actions early — not after the fact. Because if your users are dispersed — and you can’t walk up to the device — you need good telemetry.
Constructing alerts without getting drowned with false positives? An art—and a science. Worth doing a little reading and a little bump to your PC.
Reality check, people — technology alone ain’t gonna save you. Your people are your frontline — or your Achilles heel.
I’ve watched companies splurge on tech without investing in training. Bad move.
Policy templates? I have tailored ones I use for various company sizes, small and midsize businesses to large financial institutions. There is no one-size-fits all here.
Just returned from DefCon and STILLLLLL high on the hardware hacking village (no, really never a dull moment!). If those people are able to hack devices sitting in front of them, one can imagine what a professional could do at a distance, when basic security practices aren’t being followed.
Remote and hybrid working are going to be with us from now on. Your security must move beyond the VPN tunnel mirage. It’s akin to taking care of a classic car; the chassis (VPN) is critical, but if you’re not taking good care of the engine (endpoints), the fuel (identity), and the driver’s habits (awareness), you’re not going to reach your destination safely.
At P J Networks Pvt Ltd, we are doubling down on zero-trust architectures, layered security and user-centric policies. No silver bullets. Just hard-earned experience.
So don’t be lulled into a false sense of security — protect your telecommuting workforce as though your business depends on it, because it does.