In a new mini-series, Secarma’s Managing Director Holly Grace Williams, investigates how recent news events are impacting companies. In part one she takes a look at how we perform effective internal infrastructure testing, remotely.

Holly Grace Williams: Here at Secarma, we’re all working from home. I’m trapped in a home-office myself. I’ve been thinking about how being at home, and having your whole team at home, affects the threat landscape for businesses.

I’ve seen a lot of people talking about phishing attacks and using COVID-19 as a scenario, however I thought I’d talk about my usual day job and what I’ve been up to this week.

What have I been up to this week? I’ve been hacking an internal corporate network. I managed to compromise the entire corporate network to domain administrative level, and I even managed to get their WiFi password – all from the comfort of my home office.

I think this is an important topic to talk about, to get the message out that we can perform internal infrastructure assessments remotely.

I hope every single company who have made the change to operating from home have either conducted, or have at least scheduled for very soon, an internal infrastructure penetration test. Most companies testing policies state that you should have a penetration test on a schedule (often that’s annually) after any major change. If sending all your staff home doesn’t count as a major change, then I don’t know what does!

Some of you might hear that and disagree. You might be thinking – but we’ve always had a VPN and we haven’t reconfigured anything so there’s no actual system change. Well, yes, but consider the risk exposure, consider the fact that many staff are now entering the network from a different point. They’re not hooked into your physical access layer; they’re coming over the VPN. Their traffic is different, their attack surface is different, how you’re logging their activity is possibly different. Some companies are deploying BYOD given very little notice. There’s a big chance for a lot of companies that the risk is higher now.

But let’s not get ahead of ourselves. If you’re a company and your staff are operating remotely now, what kind of assessments should you consider?

External Infrastructure Assessment including a VPN Assessment

If you’re making changes to your external services to allow for staff to work from home, you should get those changes assessed. For example, maybe you found your old VPN solution didn’t have the capacity to handle all staff being home, so you’ve upgraded it. That’s the kind of change we would recommend you assess.

External infrastructure assessments can look for the points of entry into a network and highlight common misconfigurations such as known weaknesses or missing patches – vulnerabilities likely to be discovered by external threat actors.

However, that doesn’t cover all risks. What if a staff member is caught out by phishing? What if they’re working on a personal device under your brand-new BYOD policy and that device is compromised? What if their home WiFi network just sucks and an attacker could break the key easily?

Internal Infrastructure Assessments

Whilst it would be possible to supply us credentials to your VPN solution and we could perform many of the tasks associated with an internal penetration test remotely – we’ve got an alternative solution.

Our Virtual Onsite Tester (VOT) solution allows flexibility within the way we deliver services. What would traditionally be seen as internal or onsite security assessments, can be delivered fully remotely.

If you’re interested in this service and how it works then get in touch – but for now, I really just wanted to highlight the fact that this is possible. We can still deliver full internal infrastructure assessments, we can still assess internal web applications, and we can do build assessments for corporate devices – fully remotely.

If your organisation has yet to implement infrastructure testing, Secarma can help. We get it, maybe didn’t think it was possible to do it remotely, and you won’t be the only business accepting risks for the sake of business continuity right now.

Internal penetration testing can be done from home, so contact a member of our penetration testing team to secure your business today.

Latest

ledgeredge trading corporate bonds cybersecurity fintech

vISM Case Study: Working in Close Partnership with LedgerEdge

Secarma and LedgerEdge have developed an ongoing consultancy-based cybersecurity partnership, workin...

Cybersecurity Misconceptions

At Secarma, we're passionate about security. That's why, as part of Cybersecurity Awareness Month 20...

Cybersecurity Events in the Capital

Over the past month or so, the Secarma team have been very busy with cybersecurity events. From the ...