Contact Us

Contact Us

Please get in touch using the form below

I prefer to be contacted by:
View our privacy policy
Book a CREST penetration test today. Get a quote.

Overview

Identify and address remote working security risks with a specialist penetration test

If your organisation is embracing mass remote working for the first time, it’s important to ensure that it is doing so securely. Enabling workers to access the systems and data they need from home can create a wide range of cyber risks that attackers can be quick to exploit.

A remote working assessment from Redscan is a type of penetration test designed to identify and help comprehensively address security vulnerabilities that can result as a consequence of employees working outside of the office. This includes misconfigured infrastructure, devices, SaaS applications and security controls.

Challenges

Remote working security challenges

A vastly increased attack surface
Perimeter security no longer effective
Identity and access management
Reduced endpoint visibility
Employee-owned device usage
Managing cloud applications

Risks

Common home working security risks

Our CREST-certified security experts are experienced at helping organisations to identify and address a wide range of home working security risks, including:

VPN misconfigurations

Organisations commonly use Virtual Private Networks (VPNs) to enable remote workers to access corporate applications and data. We review your chosen VPN solution to ensure that it is hardened to prevent attackers from accessing your network and intercepting communications. This includes ensuring that VPN split-tunnelling, used to reduce impact on bandwidth, is implemented as securely as possible.

Cloud misconfigurations

Flaws in the way that cloud platforms and SaaS applications such as Office 365 and G Suite are set up could leave data and assets exposed. We thoroughly inspect your cloud and hybrid environments to identify risks and provide guidance to help ensure workloads are hardened in line with the latest security best practices, including benchmarks from the Center for Internet Security (CIS).

Improper access controls

To ensure that remote workers are able to access the systems they need outside the office, many organisations relax security settings such as IP address whitelisting. Use of access management technologies such as cloud access security broker (CASB) and zero-trust network access (ZTNA) can help to reduce risk, but these tools aren’t always configured optimally. We will review any access controls to ensure that they are implemented securely and configured with the latest threats in mind.

BYOD

Bring-your-own-device (BYOD) is the practice of allowing employees to use their own devices to access company networks. Some organisations use remote access technologies, application containers and application wrapping to mitigate the associated risks, but these need to be implemented securely. We review your organisation’s BYOD policy and controls to help identify improvements.

Firewall misconfigurations

Firewall misconfigurations could provide an opportunity for an attacker to obtain easy access to a network, install malware and conduct command and control (c2) activity. We assess your organisation’s firewall settings to identify open ports and review firewall policies to help ensure they adhere to the principle of least privilege.

RDP flaws

Remote Desktop Protocol (RDP) is used by remote employees to connect to and access servers and other devices. We check that RDP is configured securely and free of vulnerabilities which could allow cybercriminals to remotely take over unpatched devices.

FAQs

Remote working FAQs

What is a remote working security assessment?

A remote working security assessment is a type of penetration test designed to help organisations identify and address security risks that result as a consequence of employees working outside of the office. An assessment can uncover a range of security risks, such as misconfigured infrastructure, systems and applications. Unsafe remote working practices can also be identified.

What is a remote access penetration test?

A remote access penetration test is a type of penetration test that is specifically focused on identifying cyber security risks that result from the use of remote access solutions such as a virtual private network (VPN), a Remote Desktop Protocol Client (RDP) and Virtual Desktop. A remote access pen test can also be used to assess the implementation and use of cloud access security broker (CASB) and zero-trust network access (ZTNA) tools.

How long does a remote working security assessment take to conduct?

The time it takes a penetration tester to complete a remote working security assessment is dependent upon the scope of the engagement. A typical test to identify critical issues generally takes no more than a couple of days, but a more focused engagement to review policies such as firewall settings can extend the testing and reporting period. The duration of a test will also dependent upon the approach – whether it is a whitebox, blackbox or greybox engagement.

Can a remote working security assessment include a phishing test?

Yes, absolutely. Upon request, a remote working penetration test can include a custom email phishing exercise, designed to assess and help improve the security awareness of employees that work from home. Assessments can also target specific individuals to mirror spear phishing and business email compromise (BEC) attacks.

How has COVID-19 created additional home working security risks?

The COVID-19 pandemic has led to increased security risks for most companies, especially those that have been forced to embrace remote working for the first time. Many organisations prior to the pandemic were not set up properly to support remote working and have been forced to implement quick solutions to stay operational and provide employees with access to systems and data. In such instances, cyber security can be an afterthought.

What COVID-19 security risks should homeworkers be aware of?

Homeworkers should be alert to a wide range of remote working security risks during the COVID-19 pandemic. Users should be particularly aware of coronavirus themed phishing attacks, designed to trick recipients into disclosing sensitive information and/or installing malware.

Employees also need to exercise caution when using third party applications such as video conferencing software, which could introduce security vulnerabilities and create privacy and compliance issues.

Interested to learn more?

Get in touch

Types of penetration test

Network infrastructure testing

Network infrastructure testing

Redscan rigorously investigates your network to identify and exploit a wide range of security vulnerabilities. This enables us to establish if assets such as data can be compromised, classify the risks posed to your overall cyber security, prioritise vulnerabilities to be addressed, and recommend actions to mitigate risks identified.

Wireless testing

Wireless testing

Unsecured wireless networks can enable attackers to enter your network and steal valuable data. Wireless penetration testing identifies vulnerabilities, quantifies the damage these could cause and determines how they should be remediated.

Application and API security review

Application and API security review

Vulnerabilities contained within software are commonly exploited by cybercriminals and are easily introduced by under-pressure programmers. Redscan’s ethical hackers conduct automated and manual penetration tests to assess backend application logic and software and API source code.

Remote working assessment

Remote working assessment

If your organisation is embracing mass remote working for the first time, it’s important to ensure that it is doing so securely. Ensure your networks, applications and devices are protected and fully secured with a custom remote working security assessment.

Web application security testing

Web application security testing

Web applications play a vital role in business success and are an attractive target for cybercriminals. Redscan’s ethical hacking services include website and web app penetration testing to identify vulnerabilities including SQL injection and cross-site scripting problems plus flaws in application logic and session management flows.

Social engineering

Social engineering

People continue to be one of the weakest links in an organisation’s cyber security. Redscan’s social engineering pen test service includes a range of email phishing engagements designed to assess the ability of your systems and personnel to detect and respond to a simulated attack exercise.

Mobile security testing

Mobile security testing

Mobile app usage is on the rise, with more and more companies enabling customers to conveniently access their services via tablets and smartphones. Redscan carries out in-depth mobile application assessments based on the latest development frameworks and security testing tools.

Firewall configuration review

Firewall configuration review

Firewall rule sets can quickly become outdated. Redscan’s penetration testers can detect unsafe configurations and recommend changes to optimise security and throughput.

Expertise

Our security qualifications

Meet some of our team

“When choosing a pen test provider, you need to be confident they will deliver what they promise. At Redscan, as a CREST-accredited company, we always maintain the highest technical, legal and ethical standards. Transparency and integrity are key to everything we do.”
Jed
Head of pentesting
“Our remit is to think creatively to find solutions that will help keep your organisation more secure. We’re continually improving our knowledge of how adversaries think so that we can better identify security weaknesses and enhance detection of new and emerging threats.”
Faisal
Security Consultant
“We aim to make sure that your organisation gets the best possible value from a penetration test. We'll talk you through the assessment at every stage and answer any questions you might have along the way.”  

 

Philip
Security Consultant
“We’re focused on delivering the best pen testing security outcomes for our clients. That’s why we’ll work with your organisation every step of the way – from initial scoping of requirements through to remediating vulnerabilities. Communication is a vital part of our approach and we’ll work hard to help you achieve the results you need.”
Nima
Security Consultant

Why Redscan

A trusted partner for pen testing

  • One of the highest accredited UK pentesting companies
  • A deep understanding of how hackers operate
  • In-depth threat analysis and advice you can trust
  • Complete post-test care for effective risk remediation
  • Multi award-winning offensive security services
  • Avg. >9/10 customer satisfaction, 95% retention rate
Cyber Security Awards Winner 2019 logo

Get in touch

Complete the form for a prompt response from our team.

I prefer to be contacted by:
View our privacy policy

Resources

Discover our latest content and resources

From the blog
From the blog Case studies Latest news
28th September 2020
Redscan services now available via G-Cloud 12
To help public sector organisations reduce cyber security risk, Redscan's MDR and penetration testing services are now available on G-Cloud 12, the latest iteration of the UK government's digital marketplace, which went live today.  Read more
25th September 2020
Zerologon now being exploited in the wild
Microsoft has warned that attackers are now actively exploiting ‘Zerologon’, a critical vulnerability in the Windows Server Netlogon authentication process. Read Redscan’s Security Advisory to learn how to protect your organisation.
22nd September 2020
Educational institutions warned of spike in ransomware attacks
The National Cyber Security Centre has warned of a recent rise in ransomware attacks on educational institutions. In some cases, hackers have demanded a large Bitcoin ransom as well as threatening to expose the stolen data of students if this isn’t paid.
15th September 2020
Significant number of remote workers use own devices to access company data
A global survey of over 13,000 remote workers has found that 39% of them use their own devices to access data belonging to their employer, often via services and applications hosted in the cloud. Many of the personal devices used to do this were identified as being less secure than corporate devices.