Remote Working and Encryption
This is a subject that I tend to jump on every so often, because it’s one that people just don’t seem to get. Whether it’s working from home, from a coffee shop, airport, railway station etc, there is this perception that it’s safe because you’re connected via VPN, or perhaps some other form of application which encrypts data in transit. Well, let’s explore this subject a bit further.
There is no doubt that the propensity for working from home, or other remote locations, since COVID has introduced some very difficult, or at least challenging, security vulnerabilities into your network. For instance, prior to the pandemic, when you were 100% office based (except perhaps some mobile salespeople), your local IT provider will have almost certainly set up what we called the bastion security model. Ie, like a castle, a bastion, you had a wall around you, and for belt and braces, you also had a moat. The gateway was robust, had a drawbridge and portcullis, or let’s call it a secure firewall and anti-malware system. Everything was locked up inside and nice and secure (in fact it probably wasn’t but that’s for another day).
Whilst Microsoft didn’t invent the term the ‘new normal’, they were the first, I believe, to apply it to IT, following the enforced change in working practices brought about by the pandemic. Many companies have embraced this new normal and have settled into some form of hybrid working. Of course, this is nothing new, it’s been ‘a thing’ for years now, certainly regarding corporate organisations. The real change came about in SMEs for whom it really was quite revolutionary. Corporate bodies will have spent a lot of money on a variety or remote access systems to keep their data secure, whilst SMEs not only had to rush unprepared because of the pandemic, but they simply didn’t have the budget to employ more secure connections.
What the pandemic has done is change that, or perhaps arguably, accelerated the change to a more distributed way of working, already underway in corporate organisations but now common amongst SMEs. What does that mean for us? Firstly, we have to re-think how we are going to work. We start from a position where we still have preexisting tech, such as VPNs and whole disk encryption, to tackle modern and evolving issues.
So, what about VPNs? What are they? A VPN, or Virtual Private Network, is a service that creates a secure, encrypted connection between your device and the internet. This private “tunnel” protects your data and hides your IP address, effectively masking your online identity and activity. It works by allowing you to connect to the internet via an encrypted tunnel to a VPN server, which then forwards your requests to the website or service you’re accessing. The benefits are that it protects your data from being accessed by hackers or eavesdroppers, especially on public WIFI. It masks your IP address and replaces it with one from the VPN server, so it’s harder for websites, advertisers, or even your ISP (Internet Service Provider) to track your online activity. It’s particularly useful when working from insecure public WIFI but should also be used when working from home.
VPNs are available as standalone apps and more often now, incorporated into other applications, particularly those used to connect to cloud services.
All good, right? Well yes, anything that helps secure your data is a good thing. But like all good things it has some downsides. A VPN does help protect data in transit over an insecure WIFI connection by encrypting the data you send and receive over the internet. This means that if you’re connected to an insecure WIFI network (like in a coffee shop or airport), the VPN will prevent anyone from intercepting and reading your internet traffic.
However, a VPN does not protect data stored locally on your laptop. Files or personal information saved directly on your hard drive are not protected by the VPN. To secure the data on your laptop, you may want to consider using additional protections such as some sort of full disk encryption (BitLocker for Windows or FileVault for macOS are standard with the operating systems) to protect data at rest. And you should be using strong passwords and multi-factor authentication.
So, what I’m saying here is that should someone manage to gain access to your end point ie your laptop, desktop, even your phone, then your VPN is not going to protect you.
Let’s now talk a bit more about Bitlocker and FileVault. BitLocker, Microsoft’s disk encryption tool, provides robust security when configured properly (but I make the point here that it’s often not only incorrectly configured but isn’t even in use, making it pointless). And, like all encryption systems, its security depends on several factors, including the version of BitLocker, implementation practices, and potential vulnerabilities in the system environment. Bitlocker uses strong encryption, either AES 128 or 256 Bit, both of which are considered secure.
FileVault is the MacOS equivalent of Bitlocker (roughly) and is considered secure and built into the MacOS and is very easy to switch on. It too offers full disk encryption using AES 128 or 256 Bit. Once again though it is often not in use by Mac users, many of whom don’t even know it exists.
Are there any drawbacks to whole disk encryption? Will it protect me against things like ransomware? Whole disk encryption is designed to secure data at rest by preventing unauthorised access to data on a physical storage device (e.g., in case the device is lost or stolen). The problem is that once the machine is booted up, using the correct authentication, the disk is unencrypted, allowing you access to the data. So, the answer to the specific question re ransomware is that such an attack is typically not mitigated by this kind of encryption because:
- Ransomware Operates at the OS Level: Once a device is booted up and the encrypted disk is unlocked (usually via user login), ransomware can interact with files just like any other software. Since the operating system has access to the data, the ransomware does as well.
- Ransomware Encrypts Data Independently: Ransomware generally works by encrypting the contents of individual files or directories (not the entire disk), effectively “locking” them within the already-decrypted environment. BitLocker, or any full disk encryption, won’t stop ransomware from doing this, as it doesn’t interfere with file operations once the system is unlocked.
- No Version Control or Rollback: Whole disk encryption solutions don’t provide a way to revert to previous file versions or recover from ransomware encryption. This is where regular backups (stored separately from the network) play a critical role in protecting against ransomware.
You’re being careful, you have a VPN, and you have Bitlocker configured on your laptop. You’re feeling nice and secure and have no issues using the local Coffee Shop or your home WIFI. Your connection to your cloud service is secure and all your data in transit is encrypted. Even your email is going via a secure tunnel. All is good with the world. Except of course that as soon as you logged on your whole disk encryption is switched off and your data is vulnerable even before you transmit it. Any data you download to work on likewise becomes vulnerable as soon as it lands on your laptop.
Earlier I argued that VPNs were old tech being used to combat modern threats and a different way of working. Does that mean that I think the VPN is no longer useful and is going out of style. No of course not, VPNs have a very real place in our security architectures and that won’t go away anytime soon. But they, like the vulnerabilities they are trying to mitigate, have to evolve and keep pace with present day and future realities.
VPNs, whether stand alone, or incorporated into another technology are great at securing data in transit. What about your data at rest? The best VPN in the world won’t protect you from someone who is determined to get in and steal your data or install ransomware. The problem for SMEs is the same that it pretty much always has been. Cost. Can they afford a system that will protect their data and stop it being lost, stolen or ransomed.
What has long been needed is a simple, flexible and intuitive security solution. We believe we have found such a system that protects your company against all known threats, and puts you firmly in control of your data, working automatically 24/7 to identify and safeguard your sensitive information.
Delivering multi-level protection, it provides real time control over all sensitive data. You can identify and solve every problem with a single click of your mouse! Instead of whole disk encryption, which is decrypted as soon as you log on, it provides file level encryption which allows authorised users access but no one else. But it does more, it locates all your data, allows you to decide what is, and what is not, sensitive, and provides subscription pricing for a fully managed solution.
It’s a system that is designed specifically for SMEs and is therefore appropriate to you, and affordable. To prove that we offer a 30-day free trial so that you can see it for yourself. Check it out at https://hah2.co.uk/gdpr-data-protection/.
Recent Comments