Back to Articles
Security Strategy · May 9, 2023 · 6 min read

Device Hygiene: More Crucial Than Ever

LastPass experienced a significant data breach when attackers installed malware on an engineer's home computer. The incident highlights a critical vulnerability in remote work environments.

Device Hygiene: More Crucial Than Ever

LastPass experienced a significant data breach when attackers installed malware on an engineer's home computer. The engineer had cloud storage access on his personal device, which also contained an unpatched movie server, allowing the breach to occur.

The incident highlights a critical vulnerability in remote work environments: failing to separate personal and professional technology. Organizations must ensure that remote workers cannot introduce threats into corporate systems. This requires proper segmentation and access controls based on device authorization.

The authentication, authorization, and accounting (AAA) framework has been overlooked as companies migrated to cloud solutions. Simplified cloud access tools have exacerbated security sprawl, enabling systemic failures like the LastPass breach, which took nearly a year to detect.

Recommended Solution: Virtual Desktop Infrastructure (VDI)

VDI provides technological separation between home networks and corporate environments. Key benefits include:

Isolation: Complete browser and system isolation prevents malware transfer between personal devices and work systems.

Exfiltration Prevention: Malicious code cannot enter corporate environments from compromised home machines.

Cost Efficiency: Dynamic compute resources minimize support and infrastructure expenses.

Fresh Starts: System teardown after logout eliminates persistent threats.

The LastPass engineer's breach could have been prevented entirely with VDI access, as the unpatched personal server would have remained isolated from corporate resources.

As remote work becomes standard, organizations must secure cloud environments to limit access exclusively to authorized devices, ensuring anywhere-access remains secure.

Key Takeaways

The lesson from LastPass is clear: you cannot trust that personal devices are secure. Even well-meaning employees can have compromised devices without knowing it. An unpatched media server, a vulnerable IoT device, a family member's gaming PC on the same network—any of these can become an attack vector.

Organizations need to implement zero-trust principles for remote access. Don't assume any device is safe. Verify everything. Segment access. And consider VDI as a way to create a clean boundary between personal and professional computing.

Endré Jarraux Walls
Written by Endré Jarraux Walls

Executive. Innovator. Strategist. Speaker. Technologist.