Overview
Identify and address remote working security risks with a specialist penetration test
If your organisation is embracing mass remote working for the first time, it’s important to ensure that it is doing so securely. Enabling workers to access the systems and data they need from home can create a wide range of cyber risks that attackers can be quick to exploit.
A remote working assessment from Redscan is a type of penetration test designed to identify and help comprehensively address security vulnerabilities that can result as a consequence of employees working outside of the office. This includes misconfigured infrastructure, devices, SaaS applications and security controls.
Challenges
Remote working security challenges
Risks
Common home working security risks
Our CREST-certified security experts are experienced at helping organisations to identify and address a wide range of home working security risks, including:
VPN misconfigurations
Cloud misconfigurations
Improper access controls
BYOD
Firewall misconfigurations
RDP flaws
FAQs
Remote working FAQs
- What is a remote working security assessment?
-
A remote working security assessment is a type of penetration test designed to help organisations identify and address security risks that result as a consequence of employees working outside of the office. An assessment can uncover a range of security risks, such as misconfigured infrastructure, systems and applications. Unsafe remote working practices can also be identified.
- What is a remote access penetration test?
-
A remote access penetration test is a type of penetration test that is specifically focused on identifying cyber security risks that result from the use of remote access solutions such as a virtual private network (VPN), a Remote Desktop Protocol Client (RDP) and Virtual Desktop. A remote access pen test can also be used to assess the implementation and use of cloud access security broker (CASB) and zero-trust network access (ZTNA) tools.
- How long does a remote working security assessment take to conduct?
-
The time it takes a penetration tester to complete a remote working security assessment is dependent upon the scope of the engagement. A typical test to identify critical issues generally takes no more than a couple of days, but a more focused engagement to review policies such as firewall settings can extend the testing and reporting period. The duration of a test will also dependent upon the approach – whether it is a whitebox, blackbox or greybox engagement.
- Can a remote working security assessment include a phishing test?
-
Yes, absolutely. Upon request, a remote working penetration test can include a custom email phishing exercise, designed to assess and help improve the security awareness of employees that work from home. Assessments can also target specific individuals to mirror spear phishing and business email compromise (BEC) attacks.
- How has COVID-19 created additional home working security risks?
-
The COVID-19 pandemic has led to increased security risks for most companies, especially those that have been forced to embrace remote working for the first time. Many organisations prior to the pandemic were not set up properly to support remote working and have been forced to implement quick solutions to stay operational and provide employees with access to systems and data. In such instances, cyber security can be an afterthought.
- What COVID-19 security risks should homeworkers be aware of?
-
Homeworkers should be alert to a wide range of remote working security risks during the COVID-19 pandemic. Users should be particularly aware of coronavirus themed phishing attacks, designed to trick recipients into disclosing sensitive information and/or installing malware.
Employees also need to exercise caution when using third party applications such as video conferencing software, which could introduce security vulnerabilities and create privacy and compliance issues.
Interested to learn more?
Get in touchTypes of penetration test
Network infrastructure testing
Redscan rigorously investigates your network to identify and exploit a wide range of security vulnerabilities. This enables us to establish if assets such as data can be compromised, classify the risks posed to your overall cyber security, prioritise vulnerabilities to be addressed, and recommend actions to mitigate risks identified.
Wireless testing
Unsecured wireless networks can enable attackers to enter your network and steal valuable data. Wireless penetration testing identifies vulnerabilities, quantifies the damage these could cause and determines how they should be remediated.
Application and API security review
Vulnerabilities contained within software are commonly exploited by cybercriminals and are easily introduced by under-pressure programmers. Redscan’s ethical hackers conduct automated and manual penetration tests to assess backend application logic and software and API source code.
Remote working assessment
If your organisation is embracing mass remote working for the first time, it’s important to ensure that it is doing so securely. Ensure your networks, applications and devices are protected and fully secured with a custom remote working security assessment.
Web application security testing
Web applications play a vital role in business success and are an attractive target for cybercriminals. Redscan’s ethical hacking services include website and web app penetration testing to identify vulnerabilities including SQL injection and cross-site scripting problems plus flaws in application logic and session management flows.
Social engineering
People continue to be one of the weakest links in an organisation’s cyber security. Redscan’s social engineering pen test service includes a range of email phishing engagements designed to assess the ability of your systems and personnel to detect and respond to a simulated attack exercise.
Mobile security testing
Mobile app usage is on the rise, with more and more companies enabling customers to conveniently access their services via tablets and smartphones. Redscan carries out in-depth mobile application assessments based on the latest development frameworks and security testing tools.
Firewall configuration review
Firewall rule sets can quickly become outdated. Redscan’s penetration testers can detect unsafe configurations and recommend changes to optimise security and throughput.
Expertise
Our security qualifications
Meet some of our team
Get a Pen Test quote now
Keep your business safe by protecting your networks, systems and apps with our penetration testing services.
- One of the highest accredited UK pentesting companies
- A deep understanding of how hackers operate
- In-depth threat analysis and advice you can trust
- Complete post-test care for effective risk remediation
- Multi award-winning offensive security services
- Avg. >9/10 customer satisfaction, 95% retention rate
Resources