COVID-19: CERT-In says spurt in cyberattacks on personal comps since 'work from home' protocol began
"Cyber criminals are exploiting the COVID-19 outbreak as an opportunity to send phishing emails claiming to have important updates or encouraging donations, impersonating trustworthy organisations," the CERT-In said in its latest advisory to internet users.
The Computer Emergency Response Team of India (CERT-In) said the phenomenon has been witnessed as many organisations have asked their staff to work from home to help stop the spread of the coronavirus that has claimed thousands of live worldwide and infected millions.
"Switching to remote working because of the COVID-19 can create cyber security problems for employers and employees.
"There is an increase in the number of cyberattacks on computers, routers and unprotected home networks used by employees who have switched to remote working due to the spread of COVID-19," it said.
With most employees working from home, the agency said, enterprise VPN servers have now become paramount to a company's backbone, and their security and availability must be the focus for IT (information technology) teams.
"It is important that the VPN service is patched and up-to-date because there will be way more scrutiny against these services," it added.
The CERT-In also suggested some countermeasures and best security practices in this context: Change default passwords of your home Wi-Fi router to prevent hackers from accessing your network; use strong and unique passwords on every account and device and use two-factor authentication (2FA).
Some other countermeasures include: Not allowing sharing of work computers and other devices. When employees bring work devices home, those devices should not be shared with or used by anyone else in the home, it said.
"This reduces the risk of unauthorised or inadvertent access to protected company information," the advisory stated.
It asked users to update VPNs, network infrastructure devices, and devices being used to remote into work environments with the latest software patches and security configurations.
"Only use software your company would typically use to share files and refrain from using your personal email or 3rd party services unless reliably informed otherwise," it added.
It is recommended that even remote user activity is covered by the organisation's perimeter security tools, the advisory said.
"Ensure that remote sessions automatically time out after a specified period of inactivity and that they require re-authentication to gain access," the CERT-In said.
It also urged IT teams of the organisations to remind employees of the types of information that they need to safeguard.
"This often includes information such as confidential business information, trade secrets, protected intellectual property and other personal information," the advisory said.
"Also, 'remember password' functions should always be turned off when employees are logging into company information systems and applications from their personal devices," it said.
A specific suggestion for IT teams was to "consider Mobile Device Management (MDM) and Mobile Application Management (MAM)."
"These tools can allow organisations to remotely implement a number of security measures, including data encryption, malware scans, and wiping data on stolen devices," it said.
The CERT-In is the country's nodal agency to combat cyberattacks like hacking and phishing and is also mandated to fortify the security of the country's internet domain. NES DIVDIV