Skip to main content


Ask a business person where their office is located and the likely answer is “everywhere.” They’re working from home, staying in the loop while traveling, and catching up on email between sales calls. For productivity’s sake, many companies give their employees – and perhaps clients or service providers – remote access to their networks. Are you taking steps to ensure those outside entryways into your systems are sensibly defended?

If your business wants to start with security, it’s important to secure remote access to your network. Here are some examples based on FTC investigations, law enforcement actions, and questions that businesses have asked us.

Ensure endpoint security.

Your network is only as secure as the least safe device that connects to it – and there’s no guarantee that an employee’s home computer, a client’s laptop, or a service provider’s smartphone meets your standards for security. Before allowing them to access your network remotely, set security ground rules, communicate them clearly, and verify that the employee, client, or service provider is in compliance. Furthermore, wise companies take steps to make sure that devices used for remote access have updated software, patches, and other security features designed to protect against evolving threats.

Example: Before allowing employees to access the company network remotely, a business establishes standard configurations for firewalls, antivirus protection, and other protective measures on devices used for remote access, and conducts periodic in-house training. It also provides a token with a dynamic security code that the employee must type in to access the company’s network, and maintains procedures to ensure that employees’ devices have the mandated firewalls, antivirus protection, and other protections in place. In addition, the company regularly re-evaluates its requirements in light of emerging threats and blocks remote access by devices with outdated security. By approaching endpoint security as an ongoing process, the company has taken steps to reduce the risks associated with remote access.

Example: An executive search firm has files on its network that include confidential information about job candidates. When a prospective employer retains the search firm, the firm gives the employer remote access to its network to view those files, but doesn’t check to see that the employer’s computers use firewalls, updated antivirus software, or other security measures. The better approach would be for the search firm to contractually require minimum security standards for employers that want to access the firm’s network remotely and to use automated tools to make sure employers meet the requirements.

Put sensible access limits in place.

In this blog series, we’ve already talked about is the need to control access to data sensibly. Just as security-conscious companies restrict in-house access to sensitive files to staff members with a business need for the data, they also put sensible limits in place for remote access.

Example: A retailer hires a contractor to revamp its online payroll system. The retailer gives the contractor remote access to the portions of the network necessary to complete the task, but restricts the contractor from other parts of the system. In addition, the retailer discontinues the contractor’s authorization as soon as the task is complete. By limiting the scope and duration of the contractor’s remote access, the retailer has taken steps to protect confidential data on its network.

Example: A company decides to update its information infrastructure and signs contracts with multiple vendors to remotely install and maintain software on numerous systems on the company’s network – a project the company anticipates will take one year from start to finish. Because the vendors will be working on different portions of the network at different times, the company creates user accounts to provide each vendor with full administrative privileges throughout the company’s network for the entire year. Although this might be the fastest way for the company to manage vendor accounts, it’s an insecure choice. A wiser option would be to tailor vendors’ access to the scope of their work. For example, the company should determine if some vendors can perform their duties without administrative access privileges throughout the company’s network. Other vendors may need administrative access, but only for a limited period of time. Furthermore, if a particular vendor will have multiple employees sharing administrative access, the company should implement a method so it can audit and attribute account use to a particular vendor employee.

Not many burglars bulldoze down a wall. Instead they exploit weaknesses in doors, windows, and other external entrances. The message for companies is if you allow remote access to your network, be vigilant about defending those entryways.

Next in the series: Apply sound security practices when developing new products
 

It is your choice whether to submit a comment. If you do, you must create a user name, or we will not post your comment. The Federal Trade Commission Act authorizes this information collection for purposes of managing online comments. Comments and user names are part of the Federal Trade Commission’s (FTC) public records system, and user names also are part of the FTC’s computer user records system. We may routinely use these records as described in the FTC’s Privacy Act system notices. For more information on how the FTC handles information that we collect, please read our privacy policy.

The purpose of this blog and its comments section is to inform readers about Federal Trade Commission activity, and share information to help them avoid, report, and recover from fraud, scams, and bad business practices. Your thoughts, ideas, and concerns are welcome, and we encourage comments. But keep in mind, this is a moderated blog. We review all comments before they are posted, and we won’t post comments that don’t comply with our commenting policy. We expect commenters to treat each other and the blog writers with respect.

  • We won’t post off-topic comments, repeated identical comments, or comments that include sales pitches or promotions.
  • We won’t post comments that include vulgar messages, personal attacks by name, or offensive terms that target specific people or groups.
  • We won’t post threats, defamatory statements, or suggestions or encouragement of illegal activity.
  • We won’t post comments that include personal information, like Social Security numbers, account numbers, home addresses, and email addresses. To file a detailed report about a scam, go to ReportFraud.ftc.gov.

We don't edit comments to remove objectionable content, so please ensure that your comment contains none of the above. The comments posted on this blog become part of the public domain. To protect your privacy and the privacy of other people, please do not include personal information. Opinions in comments that appear in this blog belong to the individuals who expressed them. They do not belong to or represent views of the Federal Trade Commission.

More from the Business Blog

Get Business Blog updates