Maintaining VDI security hygiene without resistance from employees

CISO’s are all too aware that maintaining 100% uptime is essential for productivity and to this end they prioritise the availability and protection of their organisations’ systems. The spectre of the WannaCry ransomware attack, which cost the NHS in the UK millions and could have been fended off by a software update made available weeks before, looms large in the minds of anyone with responsibility for security.  

It’s understandable. The cyberattack surface is constantly growing, and as well as safeguarding their companies and their colleagues against corporate threats, many CISOs feel they are now obliged to become the go-to authority on volatile global and national security issues too. 

Their determination to close gaps in their corporate armour by strictly imposing a rigid upgrade programme, however, can meet with considerable resistance. One of the biggest challenges is establishing a more cyber-security-focused culture. All too often the security team are regarded negatively, seen as imposing disruptive processes that are considered unnecessary by other departments. Many employees don’t want to engage with cyber-security practices, and while they fully expect to have access to systems and solutions 24/7, they have little patience for the impact on their everyday tasks that an update might present. Human nature also plays its part in the delaying tactics that are used to avoid installations that could change or impact employees’ familiar interactions with existing applications.   

The difficulty of keeping remote workers secure

Putting in place a cyber-security culture was tricky enough when employees were office-based, but it has become even more so now that hybrid and remote working are the norm and reliance on remote managed and unmanaged access solutions is commonplace.

Cloud-based solutions that provide virtual desktop and virtual PC infrastructure including Citrix, Azure Virtual Desktop, w365 and VMWare, have helped to establish hybrid working as standard practice. Not only do they deliver the data and applications that employees need they also enable companies to control resources such as identity and access policies and make system administration much easier. The flip side to this, however, is the frequency of security updates and re-configuration that must be factored in to protect users and information.  

From a CISO perspective virtual infrastructure allows them to keep their arms around the security ecosystem. They can take advantage of the often monthly patches to physical servers and guest virtual machines and keep systems up to date with new software versions as and when they become available, knowing that this will protect against recently launched malware and remote access security flaws.

While some security software updates can take just minutes, others can take hours, involve reinstallation, and require the involvement of employees and this can have operational implications. Employees are no longer in a confined, controllable space using only company-managed endpoints. Instead, a mixture of managed and unmanaged devices is now more commonplace, and while CISOs are under pressure to keep security update activity to a minimum, they are only too aware that they must balance this with the potential risk of a cyberattack and the growing vulnerability of unmanaged devices.   

There is no doubt that virtual desktops, particularly those that are regularly updated with security patches, can enhance systems against attacks on applications and data at a cloud level. Securing data input at the endpoint – even a virtual endpoint – however, carries the same risk that it always did.  

New approach could solve the issue

It is possible that adopting a new security strategy and/or implementing just one type of security solution could have the answer to both problems – enabling CISOs to reduce disruptive updates and at the same time defend devices against attack.

Fundamentally, and against a backdrop of increasing cyberattacks, all organisations should be implementing zero trust. It may not be a popular approach with employees initially and requires considerable buy-in at every level from the c-suite down, but it is the most effective way to ensure that access is given only after the user or device is assessed and verified. 

If zero trust is just a step too far, or while it is being established, CISOs should be looking for a security solution that enhances and supports their existing remote access infrastructure. This needs to protect against the most insidious cyber-attacks, such as kernel level keylogging and screen grabbing, which are commonly deployed on unmanaged endpoint devices as a means for bad actors to gain entry to corporate networks. 

This type of protection, which is as effective in defending virtual desktops as it is in combatting attacks on any physical device, will wrap data and applications securely, ensuring that they are containerised against malware, without any need to identify the malware itself. 

Combatting the complacency of employees when it comes to spending time on cyber-security practices means finding solutions that are easy to implement and deploy, and most importantly, which require a single download to the device they are using. CISOs or administrators should have visibility over who has already downloaded the solution and straightforward mechanisms to ensure non-users are directed to download it so they can gain access to their virtual desktop infrastructure. 

The net effect of this is that any device, whether it is outside the physical corporate perimeter, within it, or in transit, will continue to be protected. CISOs will also have the reassurance of knowing that they can achieve a more workable approach to keeping the company, and employees, secure, and can reduce the frequency of updates that threaten to impact operations, or which are meeting resistance from colleagues. 

Dave Waterson

Dave Waterson is CEO at security company SentryBay and an expert in endpoint and application security. His technical focus areas are anti-keylogging, anti-phishing, data security, secure browsing, IoT, mobile security, identity theft and cloud-based security. He was included amongst the top 10 tech thought leaders identified by A.T Kearney at the World Economic Forum in Davos and is a winner of the Great British Entrepreneur of the Year Award, for cyber security.

Laying the foundations for global connectivity

Waldemar Sterz • 26th June 2024

With the globalisation of trade, the axis is shifting. The world has witnessed an unprecedented rise in new digital trade routes that are connecting continents and increasing trade volumes between nations. Waldemar Sterz, CEO of Telegraph42 explains the complexities involved in establishing a Global Internet and provides insight into some of the key initiatives Telegraph42...

Laying the foundations for global connectivity

Waldemar Sterz • 26th June 2024

With the globalisation of trade, the axis is shifting. The world has witnessed an unprecedented rise in new digital trade routes that are connecting continents and increasing trade volumes between nations. Waldemar Sterz, CEO of Telegraph42 explains the complexities involved in establishing a Global Internet and provides insight into some of the key initiatives Telegraph42...

IoT Security: Protecting Your Connected Devices from Cyber Attacks

Miro Khach • 19th June 2024

Did you know we’re heading towards having more than 25 billion IoT devices by 2030? This jump means we have to really focus on keeping our smart devices safe. We’re looking at everything from threats to our connected home gadgets to needing strong encryption methods. Ensuring we have secure ways to talk to these devices...

Future Proofing Shipping Against the Next Crisis

Captain Steve Bomgardner • 18th June 2024

Irrespective of whether the next crisis for ship owners is war, weather or another global health event, one fact is ineluctable: recruiting onboard crew is becoming difficult. With limited shore time and contracts that become ever longer, morale is a big issue on board. The job can be both mundane and high risk. Every day...

London Tech Week 2024: A Launched Recap

Dianne Castillo • 17th June 2024

Dominating global tech investment, London Tech Week 2024 was buzzing with innovation. Our team joined the action, interviewing founders and soaking up the latest tech trends. Discover key takeaways and meet some of the exciting startups we met!

The Future of Smart Buildings: Trends in Occupancy Monitoring

Khai Zin Thein • 12th June 2024

Occupancy monitoring technology is revolutionising building management with advancements in AI and IoT. AI algorithms analyse data from IoT sensors, enabling automated adjustments in lighting, HVAC, and security systems based on occupancy levels. Modern systems leverage big data and AI to optimise space usage and resource management, reducing energy consumption and promoting sustainability. Enhanced encryption...