Trends

Coronavirus Workplace Disruption Demands Enhanced Compromise Visibility

Much has been said about the ‘end of the perimeter.’ However, no one could have predicted how the coronavirus pandemic would force enterprises to adopt remote work and thereby change their security posture. Systems that have been built with the assumption that their users would be within their perimeter of defenses now have to work with most of their workforce being outside the perimeter. While there might not be anything wrong with a system like this, being forced to make the change overnightin some cases without the necessary planning, testing, or oversightexposes businesses to novel risks.

Network Defenses Before and After COVID-19

The standard network architecture model is built for and only works when the user is situated in the system. Overnight, every employee has migrated to a connection via VPN or modern Software Defined Perimeters (SDP), exposing those devices to the unsecured internet. The assumption that the physical network is a chokepoint through which all traffic flows, has been undone. IT teams might have been focused on business continuity, but security continuity is crucial in this case. For example, phishing attacks have always sought to bypass defenses by targeting email. The difference is that now the end-users don’t have the same layers of protection that guard against clicking on malicious content, as well as prevent that content from compromising your organization. Relying on the end-user not to engage with malicious content is a risky roll of the dice.

The location of an enterprise’s assets has not changed. The data is still hosted in the cloud or in on-site data centers, but more than ever, they are exposed to compromise coming from unprotected users. That is why there is an unprecedented need to assume that you have already been compromised, and prove otherwise. This state of affairs demands uninterrupted compromise visibility.

We are in a position to help organizations enhance their visibility into the compromise level of their critical assets with the free version of Lumu. By integrating Lumu DNS servers with an enterprise’s VPN configuration, Lumu Free can also determine if a user’s remote endpoints are communicating with adversarial infrastructure. This gives them the information they wouldn’t have otherwise, in a way that is simple and consumable. If you want to learn how Lumu and your VPN or SPD solutions can work in tandem to maintain your compromise visibility during the remote workforce era, click here. If you want to learn about Lumu Free, click here.

Security teams have had to rapidly adapt to working away from the tools, amenities, and direct access that they have at their offices. Meanwhile, they are getting bombarded with alerts. Getting visibility into what is real, confirmed compromise and what is a false negative is essential. The quicker security organizations can be exposed to all communication between their infrastructure and infrastructure from the adversary, the quicker they can mitigate and move on.

Recent Posts

  • Trends

Why EDR Evasion is the New Threat Standard

Reading Time: 4 mins48% of ransomware attacks successfully evade EDR. Threat actors like Qilin are…

6 days ago
  • Attacks

Why AI Malware Demands Machine-Speed Defense

Reading Time: 6 minsAI-powered autonomous malware now generates unique threats at machine speed. This makes…

2 weeks ago
  • Trends

Automating Defense: The 2026 Battle Plan for Understaffed School IT

Reading Time: 4 minsThe Education sector is the number one global cyber target. It is…

4 weeks ago
  • Trends

Redefining Proactive Security: Why Contact Is Not a Compromise

Reading Time: 5 minsContact is not compromise. True proactivity means prioritizing rapid response not blindly…

4 weeks ago
  • Attacks

Advisory Alert: AsyncRAT – Analysis, Evolution, and Defense Strategies

Reading Time: 6 minsAsyncRAT is an adaptable open-source Trojan that has evolved into a global…

1 month ago
  • Technical

Deconstructing a Multi-Stage Living-off-the-Land Attack

Reading Time: 10 minsThis technical deep-dive analyzes a sophisticated Amadey Stealer campaign leveraging Living-off-the-Land tactics…

2 months ago