Paul Hancock by Paul Hancock | | Blog

hooded man laptop virus

Exceptional times demand exceptional levels of protection argues Deep Secure Sales Director, Paul Hancock.

Right now, large swathes of the population are working from home in response to the coronavirus pandemic and it looks as though this could be the case for a long while to come. Irrespective of whether they’re using their own or indeed a company supplied laptop, regardless of how tightly those laptops have been locked down, or how well their Virtual Private Network (VPN) clients have been setup, you can be certain of one thing: they are unintentionally exposing their employers to the possibility of a cyberattack via the ingress of business documents and images from the home endpoint into the corporate network.

Introducing Malware

It has always been the case that people working from home present a risk in terms of the potential for them to inadvertently introduce malware into the organisation. But now the number of those working from home has sky-rocketed and so has the array of collaborative tools they are using to share business information, documents and images, from email and web downloads, to file sharing over WeTransfer and Dropbox. Add to this the additional and extremely sophisticated techniques used by cybercriminals and the problems, risks and challenges are thrown into sharp focus.

Due to the huge volumes and the need to exchange data, documents and images are a prime example of a key attack vector for cybercriminals, enabling them to smuggle in malware concealed in innocuous files and as we all know, detection-based defences offer little protection against this type of concealed cyberattack.

Threat-free Data

The best response to the problem is to elevate your level of protection. The UK NCSC provides recommendations for organisations that need to be able to trust the data being imported into an organisation, specifying the use of transformation to ensure the data is threat-free. It’s an approach that is integral to Deep Secure’s Threat Removal technology. Using an architecture that mirrors the recommendations of the NCSC, Threat Removal intercepts documents and images in real-time and transforms them into new, safe files before allowing them into the protected network. The beauty of the approach is that none of the original source file is ever delivered into the network so what the business gets from its remote workers is always 100% risk free, providing digital purity with 100% efficacy.

Business Rationale

The business rationale for increasing the level of protection is brutally simple. Organisations can ill afford the clear-up cost and the reputational damage that follows a breach at the best of times. In the current economic climate, dealing with the aftermath of such an attack could put an existential pressure on the business. We are living in exceptional times and that means we need exceptional levels of protection.

View all posts