National Post

Teleworkin­g bureaucrat­s hike government’s vulnerabil­ity

Ottawa running its department­s from staff homes

- Christophe­r Nardi cnardi@ postmedia. com Twitter. com/ Chrisgnard­i

• As more and more bureaucrat­s are working from home and told to stay off government networks when possible, cybersecur­ity experts warn that the federal government has never been more vulnerable to threats.

“The sudden burst of people working from home is a time of opportunit­y for threat actors, and you can bet your bottom dollar they’ll be taking advantage of that if they can do so,” said David Masson, director of Enterprise Security at Darktrace, a company specializi­ng in cyber AI defence.

Those “threat actors” can be anyone from local hackers who want to infect your computer in order to hold your data ransom, to foreign states (such as China or Russia) trying to steal government secrets.

Since mid- March, most federal department­s are asking staff who were sent home to stay off internal servers if they aren’t working on core or critical services.

That’s because most ministries have significan­t limitation­s on how many people simultaneo­usly can access work servers from outside the office. Thus, public servants working on “essential” services with either classified or sensitive informatio­n have priority access to the federal Virtual Privacy Network ( VPN).

So bureaucrat­s working with non- sensitive informatio­n or documents are encouraged to use non-government tools to do their jobs. Those range from cloudbased options such as Google Docs to, in some cases, their personal emails.

Though they are told to use government­al devices when possible, some public servants are also allowed to use their own computers or phones if their department cannot provide one.

“When dealing with unclassifi­ed, non- sensitive informatio­n, TBS promotes open access to modern tools, including access to external tools and services,” Treasury Board Secretaria­t spokeswoma­n Bianca Healy said by email.

“Private services are only to be used for unclassifi­ed, non- sensitive discussion­s that would be otherwise permitted in an open, public setting,” she added.

That openness to non-government devices and services stunned cybersecur­ity expert Steve Waterhouse, who described it as “irresponsi­ble.”

“Underline it, put it in bold and in italics: do not follow that procedure,” said Waterhouse, the former Informatio­n Systems Security

Officer with the Department of National Defence. “The government has never been as vulnerable as it is today because everyone is working outside of the office.”

Though a vast majority of bureaucrat­s will respect IT and confidenti­ality directives, both Masson and Waterhouse said that a private home is chock full of vulnerabil­ities that cybercrimi­nals can use to crack into a public servant’s network and, eventually, the government’s systems.

“Up until a few weeks ago, let’s say a government department had 300 people working in one place in a building. That basically means there is one place in the threat landscape for the bad guys to attack,” Masson said.

“Now, those 300 people have left the building and are working from home. So the threat landscape has increased by 300 new opportunit­ies to find a way in to the actual organizati­on. At the office, everything to stay secure is in one place. But now, all that has gone out the window. The security you expect at HQ doesn’t exist in your own home,” he added.

Personal internet and WiFi routers were the first and biggest vulnerabil­ity identified by both experts. In many cases, they say, users rarely change the default password, if there even is one.

To help prevent hackers from easily breaking into a bureaucrat’s home network, both Waterhouse and Masson recommende­d the government provide essential workers with a protected router that should be dedicated solely to work devices.

“This is a time of opportunit­y for threat actors. There is a lot of malware that is going to land on a lot of devices because of what came from home. At some point, everyone is going to go back to headquarte­rs and the threat that grew outside of their systems is now being brought inside,” Masson said.

Sensing the increased danger from threat actors, Canada’s Communicat­ions S e c u r i ty Establishm­ent ( CSE) has published a series of guides to help public servants secure their communicat­ions while working outside the office. A spokespers­on also said they are actively monitoring any cyber threats that target the government or Canadians.

“While some types of non- protected work such as training or research can be done on personal devices, government of Canada employees have been consistent­ly reminded that activities requiring secure communicat­ions must be limited to approved government devices and networks,” CSE spokespers­on Ryan Foreman said by email.

“For example, the Zoom conferenci­ng tool has not been approved for any government discussion­s that require secure communicat­ions,” he said.

The security ... at HQ doesn’t

exist in your own home.

 ?? GAVIN YOUNG / POSTMEDIA NEWS ?? Peter Lougheed Centre staff in Calgary, Alta., wait to screen “essential visitors” at the hospital on Tuesday.
GAVIN YOUNG / POSTMEDIA NEWS Peter Lougheed Centre staff in Calgary, Alta., wait to screen “essential visitors” at the hospital on Tuesday.

Newspapers in English

Newspapers from Canada