Addressing vulnerabilities posed by unmanaged devices within the network
While government IT professionals face a wide range of known network security challenges, one challenge is often considered a silent threat: unmanaged devices.
In a new podcast interview for CyberScoop, Danny Jenkins, CEO and co-founder of ThreatLocker, shares how the rise of BYOD policies and the proliferation of IoT devices have created a complex and dynamic network environment where traditional security measures are no longer sufficient. He also highlights the alarming trend of ransomware attacks originating from unmanaged devices like personal laptops or seemingly innocuous devices like unattended kiosks.
“Probably 60% of the ransomware attacks we’ve seen recently are actually not on a device that’s managed by the IT department, but a rogue device on the network,” says Jenkins.
Jenkins further stresses the vulnerabilities associated with network shares and UNC (Universal Naming Convention) paths, which lack robust authentication mechanisms. “If someone’s on your network, they can probably get access to it,” he says.
To combat these threats, Jenkins advocates for a layered approach to network security that includes focusing on dynamic access control lists (ACLs) and robust encryption measures. He also suggests prioritizing critical systems like Active Directory and file servers. “You need to prioritize by saying, ‘I’m going to harden these devices so only my trusted devices can access them,’” says Jenkins.
According to Jenkins, a balanced approach is necessary. Users should be able to access the Internet through personal devices while restricting their access to sensitive government data. This can be achieved by creating “dead zones” on the network, preventing unmanaged devices from accessing core systems. “You can still get out to the internet, and you can still make calls, but my phone cannot see the rest of the network because it doesn’t need to,” explains Jenkins.
Jenkins suggests that government IT professionals must proactively address the growing threat of unmanaged devices as part of their zero-trust security model and implement comprehensive security solutions to safeguard sensitive information.
Listen to the entire podcast conversation on CyberScoop. Learn how ThreatLocker helps government agencies protect their credibility and sensitive data.