Sitting Ducks: When Employees Work from Home



iStock-984370416As the COVID-19 health crisis rages on and millions of workers and students move to working from home (WFH) and online distance education, no one should make the error of thinking that working and learning from the comfortable and familiar surroundings of home somehow makes these employees and students safe. They are not safe. If anything, they're sitting ducks.

Hitting 'Em Where They Live

Many users who find themselves sheltering in place will be struggling with technology and services that they have little experience with. Moreover, their home computer environments may not be nearly as secure and protected as those they enjoy at the office or school.

Inexperienced and emotionally rattled students and employees represent potentially severe security problems for organizations of all shapes and sizes -- and huge opportunities for malicious actors looking to worm their way into the networks of companies, governmental organizations, and schools across the country. And they know it.

Just this morning we spotted a straightforward attempt to target remote workers at one particular company with a phishing email spoofing the company's IT department and demanding recipients click a malicious link to "securely connect to our network from home."

vpn-access-1a

This particular phish is a bit crude. But don't be fooled. There will be more of these, and they will get better as malicious actors do their research and learn more about how employees and students are actually connecting to their schools and places of employment.

The malicious link in that email takes users to -- where else? -- a credentials phish.

vpn-access-1b

Note that this slick spoof of Microsoft's familiar login page is actually hosted on a Microsoft domain -- windows.net, which is used for Microsoft Azure. It's an attractive hosting option for malicious actors as the domain seems to carry the imprimatur of Microsoft itself.

As such, many users could be easily fooled into believing this page to be a legitimate Microsoft login page and not a malicious spoof -- esp. those who are new to the process of working and learning from home and who have little familiarity with the software and services that make it happen.

Protect Your Users & Networks -- Now

The COVID-19 health crisis has confronted organizations with a myriad of new challenges. This is one of them, and it's a big one. New-school Security Awareness Training is the solution.

Now is the time to be training your users to spot and correctly handle malicious attacks landing in their inboxes, voice mail, and messaging apps. Those who wait for the crisis to pass may well find their networks overrun with malicious actors, backdoor trojans, and ransomware -- just as they're trying to get back on their feet and back in business.


Free Phishing Security Test

Would your users fall for convincing phishing attacks? Take the first step now and find out before bad actors do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.

PST ResultsHere's how it works:

  • Immediately start your test for up to 100 users (no need to talk to anyone)
  • Select from 20+ languages and customize the phishing test template based on your environment
  • Choose the landing page your users see after they click
  • Show users which red flags they missed, or a 404 page
  • Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
  • See how your organization compares to others in your industry

Go Phishing Now!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/phishing-security-test-offer

Topics: Phishing, COVID-19



Subscribe To Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews