• United States
Senior Editor, Network World

Telecommuting security concerns grow

Apr 24, 20066 mins
Network SecurityNetworkingRemote Access

IT managers say key concern is ensuring telecommuters' PCs keep pace with corporate security guidelines.

Telecommuting has become a way of life as more companies let employees work from home to do jobs that might otherwise be done on corporate premises. As a result, IT managers are adapting security policies to encompass home PCs.

Last year an estimated 8.9 million telecommuters worked from home three or more days each month during regular business hours, according to IDC. A quarter of them worked exclusively from home. At places where home-based work has become the norm, IT managers say a key concern is ensuring each telecommuter’s PC – typically granted remote access to a corporate LAN – keeps pace with office security guidelines.

“We have a fair number of employees who are telecommuters,” says Dan Lukas, lead security architect at Aurora Health Care in Wisconsin, which operates 13 hospitals and dozens of clinics and has about 25,000 employees. “We’re driven by the business, not the technology.”

Several hundred Aurora employees work from home transcribing voice recordings made by physicians regarding their patients. These transcriptionists, situated all over the country, then remotely access Aurora’s private-line network over the Internet to file each transcribed recording with a patient’s online medical records.

Another type of telecommuter at Aurora is radiologists, who can access the network to look at medical images.

Kettering Medical Center Network, a group of five hospitals in Dayton, Ohio, with 7,000 employees and 1,200 physicians, is one of many hospitals that see growth in telecommuting.

“More and more, physicians want access to their offices from home, and we’re giving radiologists secure access so they can read images from home,” says Bob Burritt, Kettering Medical Center Network’s director of technology.

According to IDC, healthcare is the industry in which telecommuting is most common, followed by the science and technical services arena, and manufacturing.

Lukas says Aurora transcriptionists who telecommute are given PCs with a standard image on them for hospital applications and security, such as anti-virus. They also are required to use secure VPN access.

The hospital is migrating from a Cisco IPSec VPN to a Juniper SSL VPN, because it doesn’t require special agent-based software to deploy.

Aurora’s IT staff coordinate with a business manager in charge of these workers’ assignments to ensure they have access only to the database resources they require.

Another group of Aurora’s telecommuters, teleradiologists, may be called upon at home to examine medical images stored in Aurora’s multigigabyte storage-area networks and server-based repositories.

Because remote access is a critical part of Aurora’s daily operations, Aurora installed Lancope’s StealthWatch intrusion-prevention system to repel denial-of-service attacks or break-in attempts.

Automated access control is immature

Despite the industry buzz about automated procedures for checking a user’s anti-virus and patch updates before granting network access, Lukas says Aurora officials, who recently tested Cisco’s Network Admission Control products, believe that for the moment it’s not a mature technology and is too expensive. “It would cost us $50 per seat,” he says.

Telecommuting is growing in acceptance: IDC predicts there will be 9.9 million telecommuters by 2009. A wide variety of organizations are offering telecommuter support. The Defense Information Systems Agency, which supports the military through technical services, is considering letting its 5,000 employees, many of whom live in Northern Virginia, telecommute at least a few days per week.

The financial-services industry is stepping gingerly into telecommuting, with IT managers aware that government regulators and auditors will want to know about security controls on home-based computers.

At Pennsylvania State Employee Credit Union in Harrisburg, a few dozen of its 650 employees, primarily the managers, are allowed to work from home, says Rob Ballard, IT support manager at PSECU.

These telecommuters receive a standard-issue workstation from PSECU for home-based work, identical to what they are given in the office. In February, the credit union added Centennial Software’s DeviceWall to its PCs to prevent USB mass-storage devices or iPods from gobbling data from any PC.

DeviceWall also lets machines work in read-only mode and can limit Wi-Fi connections and use of CDs. “We are audited frequently by internal and external auditors, and as a financial institution, we are held to a high standard,” Ballard says, noting PSECU wants telecommuting to mirror its office IT security practices.

Consultant Tom Walsh recommends that organizations adopting telecommuting equip at-home employees with dedicated PCs to be used for work only.

“Don’t allow shared computers,” says Walsh, noting that it’s poor practice to mix business and a family’s home computer use.

“Kids are too smart. They know how to get things like key loggers, and it’s happened.” Walsh suggests an alternative might be installing a separate hard drive on a home computer with security controls that deny access to all but the telecommuter.

Beyond simply having a telecommuter’s PC mirror office PCs, Walsh recommends that businesses enter into signed agreements with telecommuters on exactly how home-based PCs are to be used. This helps establish not only that the business owns them but also how they’re to be used and maintained.

A number of vendors, including CA with its Remote Unicenter, offer tools to manage Windows-based applications remotely.

Sioux Fleming, director of product management at CA, says she has seen insurance companies and other large companies hire third-party technical services to be on call to fix machines when telecommuters have trouble far from corporate headquarters.

While most companies deploy anti-virus software on telecommuter PCs, one type of security protection that’s often overlooked is adding a desktop firewall, she notes.

“Port attacks are a real thing,” Fleming points out. “While people inside the corporate LAN are probably protected at the gateway, people working at home are not.”

Tips for top telecommuter conduct

As telecommuting increases, experts offer an array of tips to keep corporate resources secure.
Provide telecommuting employees with PCs equipped with the standard office security applications and tools for remote management.
Sign a legal agreement with telecommuters about their PCs’ appropriate use and ownership.
Include the role of the telecommuter in the corporate security policy, giving management and the human resources, legal and IT departments the oportunity to agree on security requirements for this type of employee.
Take precautions to ensure the availability of remote access through adequate bandwidth and redundancy, as well as protection against denial-of-service attacks.
Assign staff to interact with telecommuters as a specialized group whoe work environment is significantly different from those on the corporate premises.