Bad Actors Still Targeting Remote Workers (Link)

Table of contents
    Illustration of a person wearing a mask and holding a crowbar, attempting to break into an office through a window. Inside the office are shelves of books, a desk, a computer, and chairs.

    Aamir Lakhani, a global security strategist, and researcher at Fortinet’s FortiGuard Labs, has shared an article on ThreatPost where he discusses the current cybersecurity problems facing remote workers and what can be done to alleviate pain.

    You can read the story here (https://threatpost.com/bad-actors-remote-everything/179458/) but we’ve collected highlights from the piece below.

    Highlights:

    • Browser-based malware is on the rise
    • The most used distribution mechanisms are:
      • Microsoft Office executables (MS Excel/MS Office, etc)
      • PDF files
      • Browser Scripts
    • Exploit kits and remote access tools (RATs) are almost as popular as Malware with bad actors
    • Attackers are using publicly available exploit kits and reinventing them in brand new ways
    • Working from home means fewer layers of security and bad actors know it
    • FortiGuared recommends Endpoint Detection and Response platforms and Zero-Trust Access as base level security measures for remote workers

    The post goes into a bit more depth and is worth reading on it’s own.

    Avatar photo

    Carl Keyser

    As Inbound Marketing Manager at Integris, Carl Keyser brings expertise in digital marketing and SEO to create insightful blog content that educates and informs readers about technology trends and best practices.