Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Virtually Insecure

    Written by

    eWEEK EDITORS
    Published June 11, 2001
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      In October 2000, Microsoft discovered that someone had broken into its internal network, evidently using a Trojan horse program to commandeer the PC of an employee who was working remotely.

      The widely reported intrusion wasnt just bad publicity for Microsoft. It was a wake-up call to the rest of the industry with a clear message: If youre going to extend access to your network to telecommuters, youd better have the proper security measures in place.

      Every time an I-manager grants remote access to the corporate network, that adds another potential point of intrusion. Increasingly, that remote access is offered through a virtual private network, which encrypts data sent over the Internet. The market for VPN software has exploded, with worldwide annual revenue expected to leap from $270 million in 2000 to more than $2 billion in 2004, according to a recent report by Infonetics Research.

      Some Internet administrators expect that a healthy VPN alone would be enough to keep the riffraff out. But that could be a costly assumption, industry experts say.

      John Kirby, director of enterprise protection strategy at global services company Electronic DataSystems, is determined not to make that mistake. “Weve known for quite a while that our employees who are involved in [remote access] situations into our network represent an exposure,” Kirby says. “The problem was that there hadnt been sufficiently robust products on the market [to combat the exposure] that would meet our needs.”

      EDS, which permits 70,000 of its approximately 120,000 employees to access the network remotely, is in the early stages of rolling out Zone Labs ZoneAlarm Pro personal firewall software, which will be installed on all PCs connecting remotely to the network, in addition to the VPN and antivirus software that the company already uses. Personal firewalls are single-user versions of the traditional server firewall software, meant to manage traffic to and from the PC.

      Gregor Freund, Zone Labs CEO, says that there is a misconception about the purpose of VPNs. “VPNs were meant for interoffice communications, such as a branch office communicating with headquarters,” he says. “When you have one office talking to another, the end points are presumably secure.”

      It was soon discovered that VPN technology could be extended to the mobile work force. But a single laptop PC is a different environment from a branch office. While the corporate network is usually protected with several layers of security — firewalls, intrusion detection systems and constant network monitoring by a security professional — many client computers that connect via VPNs usually have no additional security. That could render the VPN an encrypted tunnel not just for the mobile worker, but for any hacker who could penetrate the machine.

      “The big danger of [using VPNs] alone is you have no idea if the computer end point is secure at all,” Freund says.

      This method of attack is actually the new rage among hackers, according to Chris Rouland, director of X-Force, the internal research and development arm at Internet Security Systems. “The way we see hackers breaking in now is by specifically targeting the user of a corporations home user machine and using whats called TCP [Transmission Control Protocol] port redirection,” Rouland explains.

      That means a hacker only needs to break in once and set up a back door, which allows him to use the compromised PC as nothing more than a router from the Internet into the corporate network.

      “Once an attacker is into that VPN connection, he usually finds the hard candy shell with the soft chewy center, and then its just easy for them to hop around,” says Rouland, who believes that most broadband users are probed by hackers five to 10 times per day.

      Hacker Fodder

      Adding fuel to the fire is the continued growth of always-on broadband connections. According to Forrester Research, broadband access in the home will expand from 5 million households in 2000 to more than 46 million in 2005. And while its on and connected, a PC is available for hackers to attack.

      “The longer people are logged on, the longer they have the same IP [Internet Protocol] address, the longer the attack window,” says Leslie Stern, senior product marketing manager at Check Point Software Technologies.

      Broadband providers say its the responsibility of users to take proper security measures. For example, cable broadband provider Excite@Home advises its users to turn off the file and print sharing function in Microsoft Windows. For those with a home network, the provider recommends installing personal firewall software.

      The problem, Stern says, is that beyond those advisories, most broadband providers wont offer security support.

      Fortunately, the issue of making sure VPN-connected computers have additional security is gaining widespread attention these days. Before, it was almost unheard of for firewalls to exist anywhere other than the corporate network. The only people with personal firewalls were techies that knew how to set one up.

      Now, personal firewalls are packaged with other software or sold right off the shelf. Check Points latest VPN software, for example, includes personal firewall software. Other companies selling PC firewall software include ISS, NetScreen Technologies, SonicWall and WatchGuard Technologies. Some PCs and broadband modems come with firewall software preinstalled. And 3Com has begun embedding firewalls directly on network interface cards, so even if the operating system is vulnerable, a hacker couldnt invade the computer.

      In addition, theres intrusion detection software, which was designed to monitor corporate networks but has been extended to individual PCs. Intrusion detection software watches the traffic flowing through the PC to tell if any traffic seems out of the norm, which would then trigger an alert to the user and the administrator.

      “People are beginning to realize that products like this are fairly cheap and easy to install, and they cut down the risk of network intrusions,” says Chip Mesec, vice president of marketing at SecurityFocus.com, a news and community site for security professionals.

      Probably the biggest tool for preventing VPNs from becoming intrusion points is communicating with and educating employees. “Awareness is an important thing that needs to be built into the fabric of what youre doing,” EDS Kirby says. EDS devotes at least one week out of each year to educating its work force on security practices.

      Zone Labs Freund says that many businesses have been very bad at VPN user education. He suggests a new approach: “You can have multiple policies on the client, where it behaves in different ways depending on what youre currently connected to,” he says. For example, if the company allows employees to install Napster, an administrator could set a policy that doesnt permit Napster to run while users are connected to the VPN.

      Ronald Sable, vice president of public sector practice at managed security provider Guardent, says that most mobile users are conscientious and will follow security policies if they know what they are and how to apply them.

      “You should trust your employees . . . because you cant watch over them all the time,” he says.

      eWEEK EDITORS
      eWEEK EDITORS
      eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×