Working remote has suddenly become a necessity for most businesses. The problem: IT systems supporting a remote workforce are still playing catch up and remote employees using their home bases to access the internet are particularly vulnerable to username and password hackers.
Case in point: Pulse Secure VPN servers, used by many companies to connect remote workers saw usernames and passwords hacked in July 2020 and shared on a Russian ransomware site, for a vulnerability first identified in 2019. This potentially compromised nearly a thousand businesses that rely on a remote workforce to navigate the COVID19 pandemic.
Any business using Pulse Secure VPN (or any other VPN service) to allow employees to work remotely should make sure their systems are up-to-date.
The question: If your data is only as secure as your vendor's own systems, do you know what systems your vendors are using? At Venture Lynk, as part of our Vendor Risk Management services, we offer business health, info sec, and cybersecurity analyses of your vendors that will help identify these vulnerabilities. When sharing data, including PII, it is critical every vendor does their part to help mitigate against bad actors.
Read more at ZDNet.com