TECHNOLOGY

Here’s what the Twitter hack tells us about potential security risks of working from home

Jul 27, 2020, 7:01 AM
Twitter features...
said it would disable some features temporarily, making it more difficult for users to mindlessly retweet misleading claims. (Credit: Shutterstock Via CNN)
(Credit: Shutterstock Via CNN)

    (CNN) — The Twitter hack that compromised the accounts of Barack Obama, Kanye West and other figures earlier this month was one of the more prominent cybersecurity breaches in recent memory — and it was all the more dramatic as it played out live on the platform while users watched.

It was the first major breach reported since March, when many companies rapidly transitioned to remote working because of coronavirus.

For Twitter, the hack was certainly not a good look. CEO Jack Dorsey apologized for it on the company’s earnings call last week, saying: “Last week was a really tough week for all of us at Twitter, and we feel terrible about the security incident.”

For other companies, the hack could serve as a reminder that even at a moment when there is much else to worry about (like the economic recession and ongoing pandemic), cybersecurity threats are still an issue. It may be more true now than usual — experts say that having many people working from home presents unique security risks, especially given that many companies made the transition practically overnight.

It’s not clear whether remote working policies at Twitter, which has said it will allow some employees to continue working from home “forever” if they choose, had anything to do with the hack. But it’s something other companies should be aware of.

“The way (the transition to remote working) happened, instantly, there was no warning, and all of a sudden people were just told, ‘you’re not going back to work tomorrow,'” said Anu Bourgeois, an associate professor of computer science at Georgia State University. “Everybody became vulnerable at that point.”

Security risks from remote working

Only about 29% of workers had the option to work from home from 2017 to 2018, according to the most recent data available from the Bureau of Labor Statistics.

When coronavirus hit the United States, employers had to scramble to get a huge percentage of the country’s workforce to transition to remote working for the first time, a massive task that may have involved corner-cutting when it came to security.

There are a number of ways companies could have gone during the transition. In the hurry to keep employees safe but still maintain their workflow, companies might have given out laptops not equipped with the proper security software or asked them to use their own personal devices for work, Bourgeois said.

That issue was likely heightened for employees and families who can’t afford multiple devices and suddenly found themselves working from home while kids attended school remotely.

“They’re having to juggle different people using that device,” Bourgeois said. “Whereas at work you’re just one person, your kids may be having to use the device you use for work for their school or entertainment. You have that vulnerability of different people on your machine.”

Companies that were accustomed to having employees work only out of the office likely also had to develop new “access controls.” Whereas workers may have only been able to access their company’s servers and data from inside the office, they now may have to sign into a virtual private network (VPN) or other portal to securely access the information needed to do their jobs.

Deploying proper cybersecurity protocols for a remote workforce, “especially for a large scale company, is going to be really time consuming and difficult to do,” said Bourgeois.

She added that even with existing security software, companies could run into issues. Some security systems track employee habits — such as the normal days, times and duration of time that they typically access company systems — to identify potential hackers. But such systems may be confused by people’s changing work habits during the pandemic, and therefore could be less likely to catch breaches.

What we know about the Twitter hack

It’s unclear whether the Twitter hack had anything to do with remote working policies the company put in place in response to the pandemic.

Former Twitter employees examining the incident acknowledged that it’s a possibility, but there’s no evidence that Twitter relaxed its security to accommodate working from home. Twitter declined to comment on its remote work policies.

Twitter said the breach was the result of a coordinated “social engineering” attack that targeted workers who had administrative privileges, with the aim of taking control of the accounts.

Experts say social engineering may also be easier when people are working from home, where they may be distracted or let their guard down.

“You have people scrambling, in a different environment, and that mindset is not the same when you’re working from home versus the office,” Bourgeois said. “So many people are juggling their kids and are distracted and may be trying to quickly get through whatever task they need to get through. (They) may not be as sensitive to looking for these social engineering tactics, like phishing emails or phone calls.”

Some have also warned that hackers may try to exploit people’s fear of coronavirus in an attempt to carry out hacks or phishing attempts.

“As the world’s anxiety regarding coronavirus continues to escalate, the likelihood that otherwise more cautious digital citizens will click on a suspicious link is much higher,” the Electronic Frontier Foundation wrote in a March blog post.

The EFF cautioned people to look out for suspicious messages promising information or offers related to coronavirus, especially ones that sound too good to be true, like an offer to submit personal information in exchange for a free coronavirus vaccine.

For companies looking to avoid being the next target of an attack — in addition to implementing antivirus software and two-factor authentication — “the number one thing is education,” according to Bourgeois.

“Unless your employees are well versed in all of these different types of attacks and what to be aware of, it doesn’t matter what else you do, that person is vulnerable. Educating the workforce is key,” Bourgeois said.

–CNN’s Brian Fung contributed to this report.

The-CNN-Wire
™ & © 2020 Cable News Network, Inc., a WarnerMedia Company. All rights reserved.

Today’s Top Stories

Technology

FILE - This Friday, Feb. 16, 2018, file photo shows application icons from left, Facebook, Facebook...
Curt Gresseth

Expert gives tips on conquering your downward social media scroll

Are you addicted to the social-media scroll? An expert weighs in on what you can do to slow the scroll.
2 days ago
FILE - A Tesla owner charges his vehicle at a charging station in Topeka, Kan., Monday, April 5, 20...
TOM KRISHER AP Auto Writer

US report: nearly 400 crashes of automated tech vehicles

However, the National Highway Traffic Safety Administration cautioned against using the numbers to compare automakers,
16 days ago
Iran digital intrusion...
Curt Gresseth

Don’t get hacked. Protect your online data by being cyber-ready.

A cyber-security says defend yourself against hackers by being cyber-ready.
2 months ago
The gold star on your license will be needed if you want to fly in the next year....
Dan Bammes

Your driver’s license needs this if you want to fly in the next year

The gold star on your driver's license will be needed for anyone 18 and older. Most people have been getting them as they've renewed their licenses over the past four or so years.
2 months ago
FILE - The Twitter splash page is seen on a digital device, Monday, April 25, 2022, in San Diego. E...
KELVIN CHAN AP Business Writer

Musk’s Twitter ambitions to collide with Europe’s tech rules

Europe's Digital Services Act requires big tech companies to police their platforms more strictly or face billions in fines.
2 months ago
secondary water davis weber...
Chandler Holt

WSU achieves water conservation goals four years early

Over 5 years ago, Weber State University set a water conservation goal to reduce campus water usage by 30% by 2025, a goal they achieved in 2021.
2 months ago

Sponsored Articles

Tax Harassment...
Jordan Wilcox

The best strategies for dealing with IRS tax harassment | You have options!

Learn how to deal with IRS tax harassment. This guide will teach you how to stop IRS phone calls and letters, and how to handle an IRS audit.
spend a day at Bear Lake...
Bear Lake Convention and Visitors Bureau

You’ll love spending the day at Bear Lake | How to spend a day at Bear Lake

Bear Lake is a place that needs to be experienced. Spend a day at Bear Lake.
Curb Appeal...
Price's Guaranteed Doors

How to have the best of both worlds for your house | Home security and curb appeal

Protect your home and improve its curb appeal with the latest security solutions like beautiful garage doors and increased security systems.
Prescription opioids can be disposed of during National Prescription Take Back Day...
Know Your Script

Prescription opioid misuse | How to protect your family from the opioid epidemic

Studies have shown that prescription opioid misuse has increased since COVID-19. So what do you need to know about these opioids?
national heart month...
Intermountain Healthcare

National Heart Month: 5 Lifestyle Changes to Make Today to Keep You Heart Healthy

Heart disease is the leading cause of death for both men and women. One person dies every 36 seconds in the United States from cardiovascular disease
Joseph Smith Memorial Building...
Temple Square

The Joseph Smith Memorial Building is an icon of Salt Lake City | Why hosting an event at this beautiful location will make you a hero this year

Here's why hosting an event at the iconic Joseph Smith Memorial Building in downtown Salt Lake City will make you a hero this year.
Here’s what the Twitter hack tells us about potential security risks of working from home