Skip to content

Best practices for achieving cybersecurity visibility in hybrid work environments

Network visibility reveals network usage patterns, enhancing security awareness. Visibility is a critical part of secure hybrid work environments where new devices come online constantly, and workers can connect from almost anywhere. 

This article explains why network visibility matters in a remote and hybrid work context. We will explore the meaning of visibility and offer practical suggestions about how to discover network traffic and user activity on your network.

Why is visibility important in cybersecurity?

Visibility allows security teams to identify and monitor network connections. Good network visibility verifies the status of endpoints and inspects network traffic for threat detection and performance management.

Problems arise when engineers lack reliable visibility. Low visibility puts digital assets at risk. Malware and malicious users can infiltrate the network edge, resulting in data breaches or network attacks. Monitoring user activity is also more challenging in chaotic low visibility environments. Companies struggle to monitor data usage, creating compliance risks.

IT teams lack knowledge about traffic flows, network connections, user communities – and general performance. Troubleshooting and maintenance become very challenging.

Unfortunately, achieving cybersecurity visibility is not simple. Cloud devices and encryption create hard-to-inspect blind spots. Visibility tools may not monitor certain traffic types. Network complexity rises over time, out-pacing the ability to visualize network architecture.

Above all, remote connections can overwhelm security teams. Hybrid and remote work environments quickly become unmanageable, creating unguarded endpoints.

Cybersecurity challenges in hybrid work environments

Ensuring visibility is critical in remote or hybrid work setups. When workers leave the office, their workstations and data travel with them. Engineers must monitor every endpoint, even in remote work offices.

Visibility is hard to achieve, but the cybersecurity factors below make it essential.

  • Remote workforces expand the attack surface. Workers use many devices in different locations. They move between offices, homes, and public networks. There are more entry points for malicious actors. The risk of attacks rises.

  • Remote devices are vulnerable to network attacks. Laptops and smartphones might lack up-to-date virus protection or VPN coverage. Thieves can steal devices and extract valuable data.

  • Remote work presents opportunities for insider threats. Security teams may be unable to monitor user access. They cannot know who is viewing confidential data.

  • Collaboration tools used by remote workers also present vulnerabilities. Apps like Slack and Google Docs can expose sensitive data. Phishers can gain access via a single link.

Best practices for achieving cybersecurity visibility in hybrid work environments

Remote access comes with security risks. However, companies have many reasons to embrace home or hybrid work. Balancing flexible work and cybersecurity is critical. Follow these best practices to blend convenience and cybersecurity visibility.

Cybersecurity visibility best practices for hybrid work

Implement network monitoring

Cybersecurity visibility begins with remote network monitoring. Monitoring tools place remote agents on employee devices. Agents track network traffic, logging the files employees access, when they do so, and information like device profiles and locations.

Monitoring can raise privacy concerns if agents extend to non-work activities. Solve this issue by enforcing policies that stop workers from using the same laptop for work and leisure.

Engineers can also limit monitoring to relevant web apps and prevent the extraction of critical data. Everyday user activity remains private, but IT staff can still mitigate cybersecurity risks.

Establish clear and comprehensive cybersecurity policies

Secure remote work relies on robust cybersecurity policies. Policies create a framework for remote connections to central assets, establishing best practices and expectations.

Focus policies on critical remote work areas. For example, policies must cover password management, using antivirus tools and encryption, multi-factor authentication (MFA), and communicating with colleagues securely.

Explain what you expect from employees. Define what it means to connect or handle data safely. Reinforce expectations with regular employee training. Don’t allow anyone to set up a home office without thorough preparation.

Strengthen endpoint security

Endpoint security is a core challenge when ensuring remote work visibility. Every laptop or employee’s smartphone could be a vector for cybersecurity threats. Your security posture should cover every endpoint—wherever employees choose to work.

Require employees to use approved antivirus and anti-malware tools. Centralize patch management to ensure updates reach every device. Centralized delivery eliminates human error. Standardized protection covers all remote devices.

Use secure tools to establish remote connections. Business Virtual Private Networks (VPNs) help encrypt traffic flows and conceal business data from outsiders.

Endpoint Detection and Response (EDR) is another option. EDR tools provide threat visibility by monitoring endpoints for suspicious activity or vulnerabilities. EDR enables a proactive approach, countering weaknesses before threats to critical infrastructure emerge.

Embrace cloud-native security solutions

Using cloud services is often the best way to secure remote workers. Cloud tools do not rely on centralized network management or installing apps on user devices. Security tools reside on the cloud, traveling with employees.

Workers log on to company assets via Single Sign On (SSO) or Secure Web Gateways (SWGs). Cloud-native VPNs and network monitoring systems secure data flows when users access cloud services.

Cloud-native solutions make it easier to achieve cybersecurity visibility. Security teams can track cloud app usage, check for suspicious connections, and block access to sensitive cloud resources.

Embrace the Zero Trust security model

The Zero Trust model teaches network managers to “never trust, always verify.” This is a sound strategy for securing remote workers and ensuring cybersecurity visibility.

Basing network security on Zero Trust solutions. Robust access management tools verify identities and user permissions. Network segmentation and encryption keep critical infrastructure off limits without a business justification.

Continuous authentication also avoids complacency. Malicious actors gaining access during remote work sessions can’t get far without proving their identities. Zero Trust requires a vigilant, proactive security posture. Security teams assume that users represent cybersecurity threats unless they can prove otherwise – a stance that makes perfect sense when securing fluid remote work environments.

Strengthen access control

Access controls are a crucial component of Zero Trust approaches and a must-have for remote work visibility. Managing access promotes visibility by establishing the identities of network users. Security teams know which users are connected and their level of privileges. If users breach their privileges, systems deny access and generate alerts.

Customizing access policies using role-based access controls (RBAC) is advisable. RBAC streamlines access, mapping permissions onto employee roles. This enhances security without hindering business operations.

Provide security awareness training for remote employees

Remote work security is a human and technical challenge. Companies can only ensure cybersecurity visibility in remote work environments by providing regular employee training.

Training programs should cover critical remote work themes, including:

  • Password management and authentication using and updating security tools such as VPNs and anti-malware apps

  • Secure data handling and collaboration

  • Phishing awareness and physical device security

  • Incident response. How and when to inform security teams about threats or accidents.

How NordLayer can secure your hybrid workforce

Embracing remote work should never compromise cybersecurity. Realize the benefits of flexible working arrangements by ensuring cybersecurity visibility and creating secure remote work environments.

Building secure remote work systems from scratch is complex and time-consuming. Achieve better results (and save a lot of stress) by partnering with NordLayer’s network visibility solutions.

Our solutions make traffic visible and easy to analyze. Device Posture Monitoring verifies devices and ensures compliance with security policies. Usage Analytics helps you manage loads and optimize performance, while activity monitoring tracks member IDs and user behavior.

NordLayer’s tools put businesses in control of distributed networks. Security teams know who is connected and how they interact with network assets. To find out more, get in touch with our team today.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

How Linux (Almost) Had a Terrible, Horrible, No Good, Very Bad Day

How Linux (Almost) Had a Terrible, Horrible, No Good, Very Bad Day

If there’s one thing you can say about the people behind the xz supply chain hack, they were certainly willing to play a long con.    For the last two years, a (probable) state-sponsored hacker quietly began integrating themselves into the open source community, particularly with the people responsible for maintaining xz utils (more on what this is and what it does in a minute.)  They began systematically inserting a back door into this core component of the Linux operating system that would have allowed attackers to bypass SSH authentication and remotely access millions of systems.  We were just days away from the biggest supply chain attack in history when they were caught.

What is XZ Utils?

Xz Utils is a program that handles file compression, and it is included as part of several popular Linux distros like Fedora, Debian, and Ubuntu.  There is even a Windows version, although Windows software is usually a zip file rather than an xz file.    Programs like this are crucial because large downloads like software packages need to be compressed, or they would take forever to download even with the highest internet speed.

 

Open Source, Open to All

To understand how we came so close to disaster, you first have to understand how open source software works.  Open source means that the source code – the building blocks of the software – is available for anyone to see and modify.   Open source software is like buying a box of legos – sure, you can make the robot on the outside of the box, but you can also modify and invent whatever you want.  The same applies to open source software – if you have the requisite programming knowledge, you can contribute bug fixes, work on features, and shape the future of the programs you use every day.  Software like Microsoft Windows and macOS are closed source (although macOS runs on FreeBSD, which is open source, but the user interface and applications are closed source.) With these operating systems, you’re at the mercy of Microsoft and Apple to fix bugs, and as we all know, they often don’t (just take a look at this 40+-year-old bug someone found in Windows in 2018!)  The huge advantage of using an open source OS like Linux is that if you have a bug or a feature request that you want to be implemented, you can just do it yourself.    Of course, just because anyone can technically contribute, does not mean there is just software anarchy.  According to The Linux Foundation, most projects have a structure:

  • Leaders
  • Someone responsible for making the final decisions about features, releases, and other priorities
  • Maintainers
  • These people are leaders for specific areas or features; for instance, there is a documentation leader, a leader for developing device drivers, USB, etc. etc.  They are responsible for reviewing code from others before it gets added to their individual area.
  • Committers
  • Trusted developers who have done enough work for the project that they can make direct code changes rather than be subject to reviews by the maintainers.
  • Contributors
  • Anyone who contributes, be it code, documentation, or what have you.  Their contributions are reviewed by the maintainer(s) before they’re added to the project.

 

Foxes in the Hen House

In 2021, someone with the user name JiaT75 opened a GitHub account and made their first commit to an open source project.  They claimed it was just adding clearer error text when an untaring (aka uncompressing) process failed; at the time, it was added without comment, but in retrospect, it appears suspicious.  These changes have since been reverted. In April of 2022, Jia Tan (aka JiaT75) submitted a patch to Xz via the mailing list.  Around the same time, two people began badgering the maintainer of Xz to add another maintainer because patches were not happening fast or often enough.  Neither of these people had any history in the open source community, and after these messages they were never seen again.  Over the course of 2022, JiaT75 becomes the second most active contributor to the xz project.  In January of 2023 JiaT75 merges their first direct code change, which means they have now achieved a level of trust that allows them to implement the code for the back door.  Over the course of 2023, changes were regularly made as JiaT75 implemented the back door one piece at a time.  In February of 2024, the last few files were completed.     While this was happening, the hacker was contacting the leads of all the major Linux distributions to get them to install the updated version of xz utils.  Richard WM Jones from Redhat wrote about his contact with the hacker and Redhat’s scramble to remove the backdoor once they found it, and Ubuntu has also made public the post from Jia Tan asking them to include it.  This is an overview of the timeline, you can find an excellent detailed version with links to the GitHub submissions and e-mails here.    An Unlikely Discovery  With all the careful measures taken to make this look legit, how did they get caught?  Purely by a stroke of luck. Andres Freund, a developer working at Microsoft, was troubleshooting a performance issue on a Debian Linux system.  When you remember that no stable version of Debian was released with the vulnerability, and therefore he was working on an experimental version, the sheer luck behind this discovery is astounding.  He noticed that SSH logins were using too much CPU and recalled an error he had seen in Valgrind (a program used to monitor computer memory), so he put the pieces together.  Thanks to his keen eye and serious investigative skills, he traced the problem to xz utils and sent a missive to the Open Source Security List to describe the problem.    Most people never dig this deep into performance issues, and even if they do, it takes a lot of system knowledge to be able to trace them to the specific cause the way Freund did.

 

We’re Safe Now, Right?…..Right?

Supply chain attacks are obviously not limited to open source software. After all, the reason most people know the term “Supply chain attack” is because of SolarWinds in 2020, which was most certainly not open source.  But still, this shows that open source software may be more vulnerable than others.  When the fake accounts began badgering Lasse Collin about lack of updates,  his response showed that the open source developers are subject to limited time, burnout, and other struggles just like closed source developers, and adding this on top of the fact that open source development is not paid, well…it’s easy to see how someone could make themselves popular very quickly, and how maybe new code is not always tested as thoroughly as it should be.  Again, this definitely isn’t a problem specific to open source, but it’s perhaps easier to exploit.  Regardless of the development method, we need to ramp up supply chain security across the board before the next attack is successful.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Spray-and-pray tactics get an upgrade. MSPs face advanced phishing

Cybercriminals leverage AceCryptor and Rescoms (RAT) to upgrade spam phishing messages difficult to recognize by both humans and machines. To defend, MSPs automate protection. 

When cybersecurity experts and vendors describe phishing attacks, they usually split them into two big groups.

The first group consists of spam campaigns targeting a broad general audience with simple fraudulent messages. This approach has a low success rate but can be easily deployed en masse. The second group involves sophisticated attacks tailored for a specific person or group of people. This requires more time and planning; however, this effort pays off with higher success rates and/or other value that attackers derive.

But there are also attacks that stand somewhere in the middle and benefit from both approaches. For example, their fraudulent messaging is simple and can target broader audiences, but at the same time they are able to avoid the usual phishing red flags, largely because malicious email attachments are obfuscated with specialized tools.

ESET researchers documented such an attack when they discovered an email phishing campaign targeting European businesses.

Advanced phishing campaigns using AI and various evasion techniques are on the rise and can pose a challenge even for managed service providers (MSPs), which aim to deliver seamless IT services, including cybersecurity, to their customers while also keeping in mind their own protection. Risk from these types of campaigns are mounting because even the most focused employees may fall victim to malicious emails despite previous awareness training. Moreover, basic types of anti-phishing protection may be unable to detect these threats.

To address these risks, ESET has beefed up the prevention capabilities, incorporating advanced Anti-Malware, Antispam, and Anti-Phishing protection into ESET PROTECT, a formidable cyber threat prevention, detection, and response platform that MSPs can utilize. Having all these automated layers of protection in one service, ESET PROTECT minimizes the email attack surface, simultaneously reducing the complexity of subsequent security processes.

The most prevalent attack

Year after year, numerous surveys and reports confirm that phishing is the most prevalent attack vector.

The latest ESET H2 2023 Threat Report shows that malicious HTML files sending victims to phishing websites (HTML/Phishing.Agent trojan) remain by far the most numerous type of email threat. Overall, these attacks comprise almost a quarter (23.4 percent) of all cyber threats detected by ESET.

When it comes to the business sector, one in four U.S. companies that faced a cyberattack noticed that the initial vector was phishing in 2022.

Between 2017 and 2023, the proportion of phishing attacks among all cyberattacks reported by U.K. organizations (businesses and charities) rose from 72% to 79%, according to a survey conducted by the U.K. Department for Science, Innovation and Technology. Also, 56% of the surveyed businesses responded that they consider phishing attacks as the most disruptive that businesses face.

Phishing doesn’t have to be simple

Many of these phishing campaigns can be easily dodged by following simple awareness advice. However, as with most things in the world of IT, things are getting more complex and sophisticated — so is phishing.

ESET researchers spotted one of the latest examples of this trend just recently when monitoring the Remote Access Trojan (RAT) Rescoms, also known as Remcos.

RATs are malware that allows attackers to remotely control an infected computer, and ESET researchers discovered several recent email phishing campaigns using Rescoms and targeting businesses in European countries, including Spain, Poland, Slovakia, Bulgaria, and Serbia.

The goal of those campaigns of an unknown actor was to obtain credentials stored in browsers or email clients, which in case of a successful compromise would open the possibility for further attacks.

What makes these Rescoms campaigns special is that they use AceCryptor, a cryptor-as-a-service malware that is designed to hide other malware from cybersecurity tools.

In H2 2023, ESET detection engines saw and blocked over double the attacks using AceCryptor in comparison with H1 2023.

Moreover, this cryptor wasn’t the only tool that did its bit. In order to make phishing emails look as credible as possible, the threat actor deployed several strategies:

  • All emails look like B2B offers for the victim companies.
  • Email addresses used to send spam emails were imitating domains of other companies.
  • Business email compromise (BEC) was involved in multiple campaigns — attackers abused previously compromised email accounts of other company employees to send spam emails.
  • Attackers did their research and used existing companies and even existing employees’/owners’ names and contact information when they were signing those emails.
  • The content of emails was in many cases quite elaborate.

Translated message:

Dear Sir,

I am Sylwester [redacted] from [redacted]. Your company was recommended to us by a business partner. Please quote the attached order list. Please also inform us about the payment terms.

We look forward to your response and further discussion.

Best Regards,

How to defend

Because regular cybersecurity awareness training for employees may not be enough, and MSPs often need to take care not only about their protection but also their clients’ protection, the answer to this situation must be multilayered protection.

The main idea is to protect businesses during several stages of the attack — when a malicious email arrives in the mailbox, when an employee opens it, when they click on an attached link or file, and when malware enters the company’s system if all previous defenses were avoided.

For example, look at the multilayered protection incorporated in the ESET PROTECT Platform:

  • Anti-Spam technology filters spam messages with almost 100% accuracy.
  • Anti-Phishing prevents users from accessing web pages known for phishing by parsing message bodies and subject lines to identify URLs. URLs are then compared against the phishing database and rules to determine the presence of a phishing attempt.
  •  Anti-malware scans email attachments to determine whether it is malicious, unknown, or safe.
  • ESET’s in-product Sandbox assists in identifying the real behavior hidden underneath the surface of obfuscated malware.
  • If ESET Mail Security is unsure of the potential threat, it can forward the attachment to the proactive cloud-based threat defense tool called ESET LiveGuard Advanced. It analyzes samples in a cloud sandbox, and then submits the result back to Mail Security within minutes.
  • If the malicious attachment is opened, it will face ESET Endpoint Security monitoring and evaluating all executed applications based on their behavior and reputation. It is designed to detect and block suspicious processes.

Such multilayered and automated protection can detect even advanced phishing email threats such as the recent Rescoms campaigns. In fact, ESET PROTECT placed second in the latest AV-Comparatives Awards with 99.9% malware samples blocked with zero false positives in enterprise category. Overall, ESET received a Top-Rated Product Award in 2023.

Battling alert fatigue

An important part of an MSPs’ defense is also mitigation of alert fatigue, a situation where IT admins are so overwhelmed by alerts that they miss or ignore serious issues.

To make MSPs admins’ lives easier, the ESET PROTECT Platform allows admins to automate a variety of actions, including the resolution of sophisticated incidents. ESET also has complex MSP program with subscription flexibility, a unified ecosystem, automated responses, and integrations with the major RMM and PSA players.

All these efforts have been proven to decrease disruptions in daily workflow of ESET customers:

“Day-to-day life doesn’t tend to get overly disrupted with ESET, which is brilliant for the help desk. They don’t want to be receiving calls, truth be told. But we want to be ensured that we are on top of things, and our customers can work without having to chew up too much of our time,” says Andrew Owens, Head of Sales in Risc IT Solutions, a cloud solutions provider cooperating with ESET for the last 10 years.

Mastering vigilance without burnout

It is estimated that there are 361 billion emails sent and received daily around the world, with more than 45 percent of them spam. With such a plentiful threat landscape, it is important for businesses to be prepared for attacks on an almost daily basis without wearing down the IT team.

Having a highly automated security ecosystem from a global leader in digital security is a great way to master vigilance in the world of constant cyberthreats.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×