Quantify the total impact of quickly expanding your VPN license inventory. Before enabling remote access for thousands of users, evaluate your company’s associated bandwidth and hardware limitations. For example, some customers are reporting their firewalls weren’t configured to support a huge spike in remote connectivity.
Don’t disable security features in favor of network performance. Temporary changes can be made to better manage network traffic without sacrificing the effectiveness of security devices and appliances. Verizon can offer advice on user, traffic and load disbursement strategies or, where appropriate, new technologies that can be implemented quickly to address critical constraints. Cyber-hygiene is more critical now than ever. We’re reminding our customers to promptly patch known vulnerabilities and confirm configurations of key security systems, such as e-mail filters and VPNs.
Implement multifactor authentication (MFA) on all VPN connections. If MFA is not implemented, require remote workers to use very strong passwords. Also, ensure IT security and networking teams test VPN network and licensing limitations to prepare for mass usage and, implement modifications, such as rate limiting, to prioritize users that will require higher than normal bandwidths.
Review third party SLAs, especially for data center providers and other key suppliers. Minimize the risk of outages caused by external parties, and manage the expectations of business line executives who rely on IT by clearly communicating the SLAs of third-party providers.
Evaluate solutions like temporary remote access server (RAS) in the Cloud. A cloud-based RAS strategy might support your unexpected scaling requirements.
Additional help
National Institute of Standards and Technology e-book: Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security
Securing Your Mobile Devices
Verizon Data Breach Investigations Report
Verizon Mobile Security Index
Verizon Security Solutions
Data points:
- The financial impact of reported cybercrime was more than $2.7 B in 2018
- The number of days to discover a cyberattack is up to 66 days
- Most common types of cyberattacks are phishing and network intrusion
- Employee activities such as remote work access or mobile device usage are common sources of cyberattacks
- The average cost to a business after a data breach was $7.91 M
Sources: Verizon 2019 Data Breach Investigations Report; FBI; Internet Crime Complaint Center (IC3); U.S. Department of Justice; 2018 IC3 Annual Report