The Perils of Insecure Networks ft. Bryon Singh, RailWorks Corp.

The Perils of Insecure Networks ft. Bryon Singh, RailWorks Corp.

By Steve Gold
Posted in Security
On August 06, 2024

In our increasingly interconnected world, the importance of secure network practices cannot be overstated. As more enterprises embrace remote work, it is crucial to train workforce members on the dangers of connecting to and transmitting data over insecure networks for enterprise activities. This training should also extend to securely configuring home network infrastructure. To make these concepts engaging and memorable, we will use references from popular culture to illustrate the importance of secure network practices.

The Dangers of Insecure Networks

Consider the scenario where hackers exploit insecure networks to launch cyberattacks and steal sensitive data in "Mr. Robot". Connecting to unsecured Wi-Fi networks can expose your organization's data to similar threats, such as man-in-the-middle attacks, data interception, and unauthorized access.

Public Wi-Fi: A Risky Proposition

In "The Dark Knight Rises," Bane's takeover of Gotham City is swift and brutal because he exploits the city's weaknesses. Similarly, public Wi-Fi networks are notorious for their lack of security, making them prime targets for cybercriminals.

Employees should be trained to avoid using public Wi-Fi for any enterprise activities, such as accessing company emails, logging into business applications, or transferring sensitive data. If unavoidable, they should use a Virtual Private Network (VPN) to encrypt their internet connection and protect their data.

Secure Configuration of Home Networks

With the rise of remote work, employees often work from home, relying on their home networks for enterprise activities. Imagine if the characters in "Stranger Things" ignored the importance of securing their homes against the dangers from the Upside Down. Similarly, neglecting to secure home networks can open the door to cyber threats.

Steps for Securing Home Networks

  1. Change Default Settings: In "The Matrix," Neo changes his reality by making critical decisions. Similarly, employees should change the default settings on their routers, including the default SSID (network name) and administrative passwords. Default settings are widely known and can be easily exploited by attackers.
  2. Enable WPA3 Encryption: Just as the Avengers use advanced technology to protect the world, employees should enable the latest encryption standard, WPA3, on their home networks. WPA3 provides stronger security compared to older standards like WEP and WPA2.
  3. Update Router Firmware: In "Iron Man," Tony Stark frequently updates his suit with the latest technology. Employees should regularly update their router firmware to ensure they have the latest security patches and features.
  4. Use Strong, Unique Passwords: Think of how Hermione Granger in "Harry Potter" uses strong spells to protect the wizarding world. Employees should use strong, unique passwords for their Wi-Fi networks and avoid common or easily guessable passwords.
  5. Disable WPS: In "Jurassic Park," the park's automated systems are compromised due to a security oversight. Similarly, Wi-Fi Protected Setup (WPS) can be a weak point. Employees should disable WPS on their routers to prevent easy unauthorized access.
  6. Network Segmentation: Just as "Star Wars" characters use separate, secure channels for sensitive communications, employees should use guest networks for visitors and IoT devices, keeping them separate from their main work network.

Educating Employees on Secure Practices

  1. Regular Training Sessions: Conduct regular training sessions on network security best practices. Use engaging real-life examples and pop culture references to make the training relatable and memorable.
  2. Simulated Exercises: Implement simulated exercises to help employees recognize and respond to insecure network situations. These can include scenarios like identifying unsecured public Wi-Fi networks or configuring a home router securely.
  3. Clear Guidelines: Provide clear, accessible guidelines on secure network practices. Ensure employees know how to configure their home networks and use secure methods when connecting remotely.
  4. Continuous Learning: Encourage continuous learning by providing resources such as online courses, articles, and webinars on network security.

Training your workforce to understand the dangers of insecure networks and the importance of secure connectivity is essential in today's remote work environment. By drawing parallels to popular culture, these concepts can be made more relatable and engaging for employees. Ensuring that all users securely configure their home network infrastructure and avoid insecure connections for enterprise activities will significantly enhance your organization's security posture.

Start your training today and empower your workforce to navigate the digital landscape securely.

Here’s a link to the Security Awareness Skills Training Policy Template provided free of charge from the fine folks at the Center for Internet Security: https://www.cisecurity.org/insights/white-papers/security-awareness-skills-training-policy-template-for-cis-control-14

Here are some details on this specific Control/Safeguard. If you want more info, DM me.

CIS Control 14 – Security Skills Awareness & Training

Establish and maintain a security awareness program to influence behavior among the workforce to be security conscious and properly skilled to reduce cybersecurity risks to the enterprise.

Implementation Group 1

CIS Safeguard 14.8 - Train Workforce on the Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks

Train workforce members on the dangers of connecting to, and transmitting data over, insecure networks for enterprise activities. If the enterprise has remote workers, training must include guidance to ensure that all users securely configure their home network infrastructure.

Steve Gold

Steve Gold

Steve Gold is the Cybersecurity Practice Director at Gotham Technology Group (Gotham). He is responsible for providing the vision and thought leadership to expand Gotham’s legacy of success and build a world-class cybersecurity practice. He works closely with Gotham’s customers, industry partners, and subject matter experts to develop relevant solutions for Gotham’s clients and prospects.

Prior to joining Gotham, Steve worked with the Center for Internet Security (CIS), where he expanded the global reach, revenue, and impact of the CIS Benchmarks, CIS Controls, and CIS Hardened Images. He led the efforts to promote the CIS portfolio of low-cost and no-cost cybersecurity products and services that help private and public organizations stay secure in the connected world. He grew a team of security specialists from 12 to over 40 to assist organizations with implementing security best practices in their continual journey of cybersecurity maturity.

During his more than 20-year career, Steve led teams responsible for developing and implementing technology solutions at some of the industry’s most recognized companies such as Varonis, VMware, Dell & Wyse Technology

Steve is a frequent speaker/moderator at industry conferences and webinars, covering a wide array of information security topics. He resides and works remotely in Baltimore, MD.