{"id":4952,"date":"2020-03-24T11:45:13","date_gmt":"2020-03-24T18:45:13","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4952"},"modified":"2020-07-30T08:30:49","modified_gmt":"2020-07-30T15:30:49","slug":"employees-working-from-home-how-to-adapt-without-compromising-on-security","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/employees-working-from-home-how-to-adapt-without-compromising-on-security\/","title":{"rendered":"Employees Working from Home? How to Adapt without Compromising on Security"},"content":{"rendered":"<p>Working from home could be the \u201cnew norm\u201d for a little while. Companies, in order to ensure social distancing among their employees and curb the spread of COVID-19, have mandated that all non-essential workers stay and work out of their homes. Most conferences have been canceled, with the business impact of the cancellation of major tech events topping $1 billion in direct economic losses.<\/p>\n<p>Given the precipitous nature of the pandemic, organizations have had very little time to prepare for such large-scale remote work, let alone think about how to secure \u2018work from home\u2019 users. These remote workers still need to access enterprise applications in the cloud, and work with and store corporate data on their devices.<\/p>\n<h3><strong>Think Outside the Perimeter &#8211; Security Challenges of Working from Home<\/strong><\/h3>\n<p>Security teams now have to think about how to continue to protect corporate resources and data, when most of their employees are not within the corporate perimeter. The existing security stack within the corporate network is no longer sufficient to protect these teleworkers. In addition, teleworking exposes a much broader attack surface as workers use BYOD devices and mobile devices that share home and public Wi-Fi networks, often with a much larger variety of internet of things (IoT) devices than found in a typical work environment. Public Wi-Fi networks present a higher probability that authentication and credentials may be accidentally compromised.<\/p>\n<p>To take advantage of the chaotic nature of these times, bad actors and hackers have been busy launching coronavirus themed cyber-attacks and weaponizing well-known websites that try to provide useful, timely information for the general public. COVID-19 has become the subject line of choice for phishing\/spear-phishing campaigns that seek to take advantage of the heightened level of fear and concern.<\/p>\n<p>Let\u2019s take a look at some rising threats that we could encounter.<\/p>\n<h3><strong><em><u>Rising Threat #1\u00a0 &#8211; Coronavirus Related Malware Campaigns<\/u><\/em><\/strong><\/h3>\n<p>During the first week of March, our <a href=\"https:\/\/www.infoblox.com\/cyber-intelligence-unit\/\">cyber intelligence unit <\/a>noted that <a href=\"https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence--62\">LokiBot infostealer <\/a>joined the list of malware campaigns being distributed by cybercriminals taking advantage of the fear and interest in the spread of Coronavirus (COVID-19). From March 3rd &#8211; 6th 2020, we observed two malicious spam email campaigns distributing LokiBot under the guise of providing information on the Coronavirus impact to supply chains.<\/p>\n<p>LokiBot has become popular with cybercriminals as an information stealer that collects credentials and security tokens from infected machines. LokiBot targets multiple applications, including but not limited to Mozilla Firefox, Google Chrome, Thunderbird, as well as FTP.<\/p>\n<p>The email messages of the primary campaign had two subject lines, one of which alleged to be a supply chain update in the context of Coronavirus (COVID-19). The other subject had a more typical payment transfer theme. Both sets of messages had attached files with the same filename that delivered the malicious code.<\/p>\n<h3><strong><em><u>Rising Threat #2\u00a0 &#8211; Lookalike Domains<\/u><\/em><\/strong><\/h3>\n<p>Another threat that could be on the rise is <a href=\"https:\/\/www.infoblox.com\/wp-content\/uploads\/infoblox-solution-note-protect-your-network-and-customers-with-lookalike-monitoring.pdf\">Lookalike Domains<\/a>. Cybercriminals are moving to lookalike domains to fool victims in their efforts to impersonate the target organization or brand. Often phishing websites feature domains that impersonate the real brand. These are crafted by cybercriminals to resemble the legitimate brand\u2019s domain. Character substitution is a popular technique employed by cybercriminals with the goal of manipulating users into exposing credit cards, passwords, and other sensitive data.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4953 size-large\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Work-from-Home-Blog-1-1024x335.png\" alt=\"\" width=\"1024\" height=\"335\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Work-from-Home-Blog-1-1024x335.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Work-from-Home-Blog-1-300x98.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Work-from-Home-Blog-1-768x251.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Work-from-Home-Blog-1.png 1254w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p><em>Figure 1 &#8211; Lookalike Domains<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Researchers also found that cybercriminals are using valid Transport Layer Security (TLS) certificates which is an attempt to make the lookalike domains appear legitimate. In late 2019, researchers note that there were more than 100,000 lookalike domains impersonating legitimate retailers. Industries that can be heavily impacted by these types of attacks are retail and banking, where users typically enter their credentials to execute a transaction.<\/p>\n<h3><strong><em><u>Rising Threat #3 &#8211; Data Exfiltration<\/u><\/em><\/strong><\/h3>\n<p>Your work from home users are still accessing, interacting with and storing corporate data on their devices, as part of their day to day business operations. But they are now doing it outside the corporate perimeter. That data, even if stored on company-provided devices, could be exposed to theft. DNS tunneling or data exfiltration is an attacker technique that uses malware to gather sensitive data from a compromised system.\u00a0 It packages up the data into small chunks and embeds them within a string of DNS queries. The DNS queries carrying the data are then delivered to a server hosted by the attacker on the Internet, where the stolen data can be easily reassembled.<\/p>\n<h3><strong><em><u>Rising Threat #4 &#8211; Non-Compliant Website Access<\/u><\/em><\/strong><\/h3>\n<p>While this is not technically an attack or a malicious campaign launched by bad actors, companies could still be faced with the problem of their work from users accessing websites and destinations not in compliance with their policy during working hours using corporate provided devices. This could include websites related to social media, violence and adult content. While it\u2019s second nature for employees working in the office to know that such access is not appropriate or compliant, at home those same employees may have more of a lax attitude.<\/p>\n<h3><strong>Securing Work from Home Users with BloxOne<sup>TM<\/sup> Threat Defense<\/strong><\/h3>\n<p>While there may be certain solutions available to protect your teleworkers, one of the best and most cost-effective ways to secure such a large scale tele-workforce is using a technology that is the foundation of the Internet &#8211; DNS. Every connection to the Internet goes through DNS and work from home users are using public DNS or DNS provided by their service providers. But these providers seldom do security enforcement on DNS. By that I mean, detecting DNS requests to sites that are known to host malware or checking for data exfiltration via DNS.<\/p>\n<p><a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\">BloxOne\u2122 Threat Defense<\/a> from Infoblox protects users, devices, and systems no matter where they are, extending enterprise-level security to remote locations, and work from home environments. \u00a0It:<\/p>\n<ul>\n<li>detects and blocks phishing, exploits, ransomware, and other modern malware, preventing teleworkers from accessing malicious web destinations using DNS as the first line of defense.<\/li>\n<li>blocks access to objectionable content restricted by policy.<\/li>\n<li>Uses unique patented technology to prevent DNS based data exfiltration and keep protected data safe, and<\/li>\n<li>monitors for advanced threats including the rising threat of lookalike domains.<\/li>\n<\/ul>\n<p>Access to the cloud service is through the lightweight Infoblox endpoint agent, which is easy to deploy on your remote users\u2019 devices from the cloud, simple to manage, and securely redirects the endpoint\u2019s DNS to Infoblox cloud for any time, anywhere protection and monitoring.<\/p>\n<p>To learn more about securing remote workers in the age of teleworking, read this <a href=\"https:\/\/www.infoblox.com\/resources\/whitepaper\/securing-remote-workers-in-the-age-of-teleworking\">whitepaper<\/a>.<\/p>\n<p>You can sign up for a free trial of BloxOne\u2122 Threat Defense <a href=\"https:\/\/info.infoblox.com\/resources-evaluations-bloxone-threat-defense.html\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Working from home could be the \u201cnew norm\u201d for a little while. Companies, in order to ensure social distancing among their employees and curb the spread of COVID-19, have mandated that all non-essential workers stay and work out of their homes. Most conferences have been canceled, with the business impact of the cancellation of major [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":4972,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[247,72,15,248],"class_list":{"0":"post-4952","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns-tunneling","9":"tag-exfiltration","10":"tag-security","11":"tag-work-from-home","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Employees Working from Home? How to Adapt without compromising on security.<\/title>\n<meta name=\"description\" content=\"Working from home could be the \u201cnew norm\u201d for a little while. Companies, in order to ensure social distancing among their employees and curb the spread of COVID-19, have mandated that all non-essential workers stay and work out of their home. Given the precipitous nature of the pandemic, organizations have had very little time to prepare for such large-scale remote work, let alone think about how to secure \u2018work from home\u2019 users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/employees-working-from-home-how-to-adapt-without-compromising-on-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Employees Working from Home? How to Adapt without Compromising on Security\" \/>\n<meta property=\"og:description\" content=\"Working from home could be the \u201cnew norm\u201d for a little while. Companies, in order to ensure social distancing among their employees and curb the spread of COVID-19, have mandated that all non-essential workers stay and work out of their home. Given the precipitous nature of the pandemic, organizations have had very little time to prepare for such large-scale remote work, let alone think about how to secure \u2018work from home\u2019 users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/employees-working-from-home-how-to-adapt-without-compromising-on-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-24T18:45:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-30T15:30:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-stock-image-hue.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"322\" \/>\n\t<meta property=\"og:image:height\" content=\"180\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/employees-working-from-home-how-to-adapt-without-compromising-on-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/employees-working-from-home-how-to-adapt-without-compromising-on-security\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"Employees Working from Home? How to Adapt without Compromising on Security\",\"datePublished\":\"2020-03-24T18:45:13+00:00\",\"dateModified\":\"2020-07-30T15:30:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/employees-working-from-home-how-to-adapt-without-compromising-on-security\\\/\"},\"wordCount\":1100,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/employees-working-from-home-how-to-adapt-without-compromising-on-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-stock-image-hue.jpg\",\"keywords\":[\"DNS Tunneling\",\"Exfiltration\",\"Security\",\"Work From Home\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/employees-working-from-home-how-to-adapt-without-compromising-on-security\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/employees-working-from-home-how-to-adapt-without-compromising-on-security\\\/\",\"name\":\"Employees Working from Home? How to Adapt without compromising on security.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/employees-working-from-home-how-to-adapt-without-compromising-on-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/employees-working-from-home-how-to-adapt-without-compromising-on-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-stock-image-hue.jpg\",\"datePublished\":\"2020-03-24T18:45:13+00:00\",\"dateModified\":\"2020-07-30T15:30:49+00:00\",\"description\":\"Working from home could be the \u201cnew norm\u201d for a little while. Companies, in order to ensure social distancing among their employees and curb the spread of COVID-19, have mandated that all non-essential workers stay and work out of their home. Given the precipitous nature of the pandemic, organizations have had very little time to prepare for such large-scale remote work, let alone think about how to secure \u2018work from home\u2019 users.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/employees-working-from-home-how-to-adapt-without-compromising-on-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/employees-working-from-home-how-to-adapt-without-compromising-on-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/employees-working-from-home-how-to-adapt-without-compromising-on-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-stock-image-hue.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-stock-image-hue.jpg\",\"width\":322,\"height\":180},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/employees-working-from-home-how-to-adapt-without-compromising-on-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Employees Working from Home? How to Adapt without Compromising on Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Employees Working from Home? How to Adapt without compromising on security.","description":"Working from home could be the \u201cnew norm\u201d for a little while. Companies, in order to ensure social distancing among their employees and curb the spread of COVID-19, have mandated that all non-essential workers stay and work out of their home. Given the precipitous nature of the pandemic, organizations have had very little time to prepare for such large-scale remote work, let alone think about how to secure \u2018work from home\u2019 users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/employees-working-from-home-how-to-adapt-without-compromising-on-security\/","og_locale":"en_US","og_type":"article","og_title":"Employees Working from Home? How to Adapt without Compromising on Security","og_description":"Working from home could be the \u201cnew norm\u201d for a little while. Companies, in order to ensure social distancing among their employees and curb the spread of COVID-19, have mandated that all non-essential workers stay and work out of their home. Given the precipitous nature of the pandemic, organizations have had very little time to prepare for such large-scale remote work, let alone think about how to secure \u2018work from home\u2019 users.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/employees-working-from-home-how-to-adapt-without-compromising-on-security\/","og_site_name":"Infoblox Blog","article_published_time":"2020-03-24T18:45:13+00:00","article_modified_time":"2020-07-30T15:30:49+00:00","og_image":[{"width":322,"height":180,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-stock-image-hue.jpg","type":"image\/jpeg"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/employees-working-from-home-how-to-adapt-without-compromising-on-security\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/employees-working-from-home-how-to-adapt-without-compromising-on-security\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"Employees Working from Home? How to Adapt without Compromising on Security","datePublished":"2020-03-24T18:45:13+00:00","dateModified":"2020-07-30T15:30:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/employees-working-from-home-how-to-adapt-without-compromising-on-security\/"},"wordCount":1100,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/employees-working-from-home-how-to-adapt-without-compromising-on-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-stock-image-hue.jpg","keywords":["DNS Tunneling","Exfiltration","Security","Work From Home"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/employees-working-from-home-how-to-adapt-without-compromising-on-security\/","url":"https:\/\/www.infoblox.com\/blog\/security\/employees-working-from-home-how-to-adapt-without-compromising-on-security\/","name":"Employees Working from Home? How to Adapt without compromising on security.","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/employees-working-from-home-how-to-adapt-without-compromising-on-security\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/employees-working-from-home-how-to-adapt-without-compromising-on-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-stock-image-hue.jpg","datePublished":"2020-03-24T18:45:13+00:00","dateModified":"2020-07-30T15:30:49+00:00","description":"Working from home could be the \u201cnew norm\u201d for a little while. Companies, in order to ensure social distancing among their employees and curb the spread of COVID-19, have mandated that all non-essential workers stay and work out of their home. Given the precipitous nature of the pandemic, organizations have had very little time to prepare for such large-scale remote work, let alone think about how to secure \u2018work from home\u2019 users.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/employees-working-from-home-how-to-adapt-without-compromising-on-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/employees-working-from-home-how-to-adapt-without-compromising-on-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/employees-working-from-home-how-to-adapt-without-compromising-on-security\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-stock-image-hue.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-stock-image-hue.jpg","width":322,"height":180},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/employees-working-from-home-how-to-adapt-without-compromising-on-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Employees Working from Home? How to Adapt without Compromising on Security"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4952"}],"version-history":[{"count":9,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4952\/revisions"}],"predecessor-version":[{"id":5459,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4952\/revisions\/5459"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/4972"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}