{"id":33862,"date":"2020-03-16T20:02:00","date_gmt":"2020-03-16T20:02:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/coronavirus-challenges-remote-networking\/"},"modified":"2020-03-16T20:02:00","modified_gmt":"2020-03-16T20:02:00","slug":"coronavirus-challenges-remote-networking","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/coronavirus-challenges-remote-networking\/","title":{"rendered":"Coronavirus challenges remote networking"},"content":{"rendered":"<p>As the coronavirus spreads, many companies are requiring employees to work from home, putting unanticipated stress on remote networking technologies and causing bandwidth and security concerns.<\/p>\n<p>Businesses have facilitated brisk growth of teleworkers over the past decades to an estimated 4 million-plus. The&nbsp;meteoric&nbsp;rise in new remote users expected to come online as a result of the novel coronavirus calls for stepped-up capacity.<\/p>\n<p>Research by VPN vendor <a href=\"https:\/\/atlasvpn.com\/blog\/vpn-usage-in-italy-rockets-by-112-and-53-in-the-us-amidst-coronavirus-outbreak\/\" rel=\"nofollow\">Atlas<\/a> shows that VPN usage in the U.S. grew by 53% between March 9 and 15, and it could grow faster.&nbsp;VPN usage in Italy, where the virus outbreak is about two weeks ahead of the U.S., increased by 112% during the last week. &#8220;We estimate that VPN usage in the U.S. could increase over 150% by the end of the month,&#8221; said Rachel Welch, chief operating officer of Atlas VPN, in a statement.<\/p>\n<aside id=\"fsb-2785\" class=\"fakesidebar fakesidebar-auto\"><strong>[ Also see <a href=\"https:\/\/www.networkworld.com\/article\/3236448\/lan-wan\/what-to-consider-when-deploying-a-next-generation-firewall.html\">What to consider when deploying a next generation firewall<\/a>. | Get regularly scheduled insights by <a href=\"https:\/\/www.networkworld.com\/newsletters\/signup.html\">signing up for Network World newsletters<\/a>. ]<\/strong><\/aside>\n<p>Businesses are trying to get a handle on how much capacity they&#8217;ll need by running one-day tests. For example, JPMorgan Chase, Morningstar and analytics startup Arity have tested or plan to test their systems by having employees work from home for a day, according to the <a href=\"https:\/\/www.chicagotribune.com\/coronavirus\/ct-coronavirus-work-from-home-20200312-bscm4ifjvne7dlugjn34sksrz4-story.html\" rel=\"nofollow\">Chicago Tribune<\/a>.<\/p>\n<p>On the government side, agencies such as <a href=\"https:\/\/federalnewsnetwork.com\/workforce\/2020\/03\/agencies-ramp-up-coronavirus-preparations-as-noaa-plans-large-scale-telework-test\/\" rel=\"nofollow\">National Oceanic and Atmospheric Administration<\/a> and NASA have or will run remote networking stress tests to understand their remote networking capacity and what the impact will be if they add thousands of new teleworkers. About <a href=\"https:\/\/fas.org\/sgp\/crs\/misc\/R43590.pdf\" rel=\"nofollow\">2 million people<\/a> work for the government in the U.S.<\/p>\n<p>To help stave off congestion in cellular data networks, the <a href=\"https:\/\/www.fcc.gov\/coronavirus\" rel=\"nofollow\">Federal Communications Commission<\/a> has granted T-Mobile temporary access to spectrum in the 600MHz band that&#8217;s owned by other licensees.&nbsp;T-Mobile said it requested the spectrum &#8220;to make it easier for Americans to participate in telehealth, distance learning, and telework, and simply remain connected while practicing recommended &#8216;social distancing&#8217;.&#8221;<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id><\/aside>\n<p>Last-mile internet access may become congested in areas that rely on wireless connectivity, some industry players warn.<\/p>\n<aside id=\"fsb-3065\" class=\"fakesidebar fakesidebar-auto fakesidebar-sponsored\">\n<aside class=\"nativo-promo\">\n<div class=\"excerpt-img bugblog ntv-preview-img-wrapper\" id=\"ntvImageBox\"><img alt=\"ITAAS and Corporate Storage Strategy\" title=\"ITAAS and Corporate Storage Strategy\" data-original=\" https:\/\/images.idgesg.net\/images\/article\/2019\/09\/hpe_nww_post3-100811447-medium.3x2.jpg\" class=\"lazy\" loading=\"lazy\"><\/div>\n<div class=\"excerpt-text\">\n<p class=\"post-meta\"><span class=\"sponsored-blog\">BrandPost<\/span> <span class=\"post-byline\">Sponsored by HPE<\/span><\/p>\n<p class=\"crawl-headline\"><a href=\"https:\/\/www.networkworld.com\/blog\/itaas-and-the-corporate-storage-technology\/?utm_source=IDG&amp;utm_medium=promotions&amp;utm_campaign=HPE22140&amp;utm_content=sidebar\" title=\"ITAAS and Corporate Storage Strategy\" target=\"_blank\" rel=\"noopener noreferrer\">ITAAS and Corporate Storage Strategy<\/a><\/p>\n<p class=\"crawl-summary\">Pay-per-use IT models, such as ITaaS, could be the next chapter in IT infrastructure.<\/p>\n<\/div>\n<\/aside>\n<\/aside>\n<p>&#8220;Bottlenecks are likely going to exist in hard-to-reach areas, such as rural locations, where internet access relies on microwave or wireless infrastructure,&#8221; said Alex Cruz Farmer, product manager for network intelligence company ThousandEyes, which makes software that analyzes the performance of local and wide area networks. &#8220;The challenge here is that the available bandwidth is usually much less via these solutions, as well as more latent.&#8221;<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id><\/aside>\n<p>&#8220;We have seen a very small number of platform-related issues or outages due to increased loads, although those have since been resolved,&#8221; added ThousandEyes&#8217; Farmer.<\/p>\n<p>For its part, AT&amp;T said it has noticed shifts in usage on its wireless network, but capacity has not been taxed.<\/p>\n<p>&#8220;In cities where the coronavirus has had the biggest impact, we are seeing fewer spikes in wireless usage around particular cell towers or particular times of day, because more people are working from home rather than commuting to work, and fewer people are gathering in large crowds at specific locations,&#8221; <a href=\"https:\/\/about.att.com\/pages\/COVID-19.html\" rel=\"nofollow\">AT&amp;T said in a statement<\/a>. &#8220;We continuously monitor bandwidth usage with tools that analyze and correlate network statistics, which reveal network trends and provide us with performance and capacity reports that help us manage our network.&#8221;<\/p>\n<p>Verizon says it hasn&#8217;t seen a measurable increase in data usage since the coronavirus outbreak, despite a jump in the number of customers working from home. &#8220;Verizon\u2019s networks are designed and built to meet future demand and are ready should demand increase or usage patterns change significantly. While this is an unprecedented situation, we know things are changing, and we are ready to adjust network resources as we better understand any shifts in demand,&#8221; the company said in a statement.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id><\/aside>\n<p>Verizon has been monitoring network usage in the most affected areas and pledged to work with and prioritize network resources to meet the needs of hospitals, first responders and government agencies. It also announced plans to increase capital spending from between $17 billion and $18 billion to between $17.5 billion to $18.5 billion in 2020 in an effort to &#8220;accelerate Verizon&#8217;s transition to 5G and help support the economy during this period of disruption.&#8221;<\/p>\n<h2>Enterprise VPN security concerns<\/h2>\n<p>For enterprises, supporting the myriad network and security technologies that sit between data centers and remote users is no small task, particularly since remote-access VPNs, for example, typically rely on residential internet-access services over which businesses have little control. But IT pros should try to verify that these connections meet enterprise standards, according Tom Nolle, president of CIMI Corp. (Read more of Nolle&#8217;s thoughts on working at home&nbsp;<a href=\"https:\/\/blog.cimicorp.com\/?p=4055\" rel=\"nofollow\">here<\/a>.)<\/p>\n<p>&#8220;The home broadband elements, like the ISP and DNS and Wi-Fi, should really be part of a business certification of suitable networking for home work,&#8221; Nolle said. &#8220;I find that DNS services like Google&#8217;s are less prone to being overloaded than ISPs&#8217; services, which suggests users should be required to adopt one of them. OpenDNS is also good.&#8221;<\/p>\n<p>The security of home Wi-Fi networks is also an issue, Nolle said. IT pros should require workers to submit screenshots of their Wi-Fi configurations in order to validate the encryption being used. &#8220;Home workers often bypass a lot of the security built into enterprise locations,&#8221; he said.&nbsp;<\/p>\n<p>Education of new home workers is also important, said Andrew Wertkin, chief strategy officer with DNS software company BlueCat. &#8220;There will be remote workers who have not substantially worked from home before, and may or may not understand the implications to security,&#8221; Wertkin said. &#8220;This is especially problematic if the users are accessing the network via personal home devices versus corporate devices.&#8221;<\/p>\n<p>An unexpected increase in remote corporate users using a <a href=\"https:\/\/www.networkworld.com\/article\/3268744\/understanding-virtual-private-networks-and-why-vpns-are-important-to-sd-wan.html\">VPN<\/a>&nbsp;can also introduce cost challenges.<\/p>\n<p>&#8220;VPN appliances are expensive, and moving to virtualized environments in the cloud often can turn out to be expensive when you take into account compute cost and per-seat cost,&#8221; Farmer said. A significant increase in per-seat VPN licenses have likely not been budgeted for.<\/p>\n<p>On the capacity side, systems such as DHCP, which doles out IP addresses, could come under stress with increased remote-access use. &#8220;It doesn&#8217;t matter if there are enough licenses for VPN if the devices connecting cannot obtain network addresses,&#8221; Wertkin said. &#8220;Companies must test for and understand choke points and start implementing strategies to mitigate these risks.&#8221;<\/p>\n<p>Along those lines, enterprises &#8220;may have to validate the number of SSL sockets their data centers can expose for use, or they could end up running out,&#8221; Nolle said.<\/p>\n<p>Paul Collinge, a senior program manager in the Microsoft Office 365 product team, raised similar concerns. Network elements such as VPN concentrators, central network egress equipment such as proxies, DLP, central internet bandwidth, backhaul MPLS circuits, and NAT capability are put under enormous strain when all employees are using them,&nbsp;Collinge wrote in a&nbsp;<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/office-365-blog\/how-to-quickly-optimize-office-365-traffic-for-remote-staff-amp\/ba-p\/1214571\" rel=\"nofollow\">blog<\/a>&nbsp;about optimizing Office 365 traffic for remote staff. The result is poor performance and productivity coupled with a poor user experience for those working from home.<\/p>\n<p>ThousandEyes&#8217; Farmer said enterprises might have to increase the number of VPN concentrators on their networks. &#8220;This way, remote-user connectivity is distributed across multiple VPN endpoints and not concentrated,&#8221; he said. If that&#8217;s not an option, businesses may have to open firewall ports to allow access to essential applications, which would enable them to scale up, but could also weaken security temporarily.<\/p>\n<h2>Can VPN split tunneling help?<\/h2>\n<p>Industry players are divided on the use of split tunnerling to minimize coronavirus capacity concerns.<\/p>\n<p>VPNs can be set up to allow split tunneling, where only traffic intended for the corporate network tunnels through the VPN, BlueCat&#8217;s Wertkin&nbsp;said. The rest of the traffic goes directly to the internet at large, meaning it isn&#8217;t subject to the security controls imposed by the tunnel and by tools within the corporate network, which is a security concern. This could lead to remote users&#8217; computers being compromised by internet-borne attacks, which could in turn put corporate data and networks at risk.<\/p>\n<p>Despite this, Microsoftlast week recommended split tunneling as a way for IT admins to address its Office 365 service becoming congested due to an influx of remote users. In <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/office-365-blog\/how-to-quickly-optimize-office-365-traffic-for-remote-staff-amp\/ba-p\/1214571\" rel=\"nofollow\">the advisory<\/a>, Microsoft offers a list of URLs and IP addresses for its points of access and describes how IT can use that information to route traffic directly to Office 365.<\/p>\n<p>The VPN client should be configured so that traffic to identified URLs\/IPs\/ports is routed in this way, according to Collinge. &#8220;This allows us to deliver extremely high performance levels to users wherever they are in the world.\u201d<\/p>\n<p>ThousandEyes&#8217; Farmer said increased use of remote access VPNs might call for a review of network security in general. &#8220;[For] enterprises that are still using a legacy network security architecture, it may be time to consider cloud-based security options, which could improve performance for remote workers and diminish the overall use of the enterprise\u2019s WAN circuits.&#8221;<\/p>\n<p>Other related developments:<\/p>\n<ul>\n<li>The <a href=\"https:\/\/www.fcc.gov\/document\/commissioner-starks-statement-fccs-response-covid-19\" rel=\"nofollow\">FCC<\/a> called on broadband providers to relax their data cap policies in appropriate circumstances, on telephone carriers to waive long-distance and overage fees in appropriate circumstances, on those that serve schools and libraries to work with them on remote learning opportunities, and on all network operators to prioritize the connectivity needs of hospitals and healthcare providers. AT&amp;T and others have responded.<\/li>\n<li><a href=\"https:\/\/www.warner.senate.gov\/public\/_cache\/files\/2\/3\/239084db-83bd-4641-bf59-371cb829937a\/A99E41ACD1BA92FB37BDE54E14A97BFA.letter-to-isps-on-covid-19-final-v2.-signed.pdf\" rel=\"nofollow\">U.S. Senator Mark R. Warner (D-VA)<\/a> and 17 other senators sent a letter to the CEOs of eight major ISPs calling on the companies to take steps to accommodate the unprecedented reliance on telepresence services, including telework, online education, telehealth, and remote support services. In the letter, sent to the CEOs of AT&amp;T, CenturyLink, Charter Communications, Comcast, Cox Communications, Sprint, T-Mobile, and Verizon, the senators call on companies to suspend restrictions and fees that could limit telepresence options. Related to the nation&#8217;s broadband gaps, they also call on the companies to provide free or at-cost broadband options for students affected by the virus who otherwise lack broadband access for online learning during the outbreak.<\/li>\n<li>Vendors including <a href=\"https:\/\/blogs.cisco.com\/collaboration\/cisco-announces-work-from-home-webex-contact-center-quick-deployment\" rel=\"nofollow\">Cisco<\/a>, Microsoft, <a href=\"https:\/\/cloud.google.com\/blog\/products\/g-suite\/helping-businesses-and-schools-stay-connected-in-response-to-coronavirus\" rel=\"nofollow\">Google<\/a>, <a href=\"https:\/\/www.gotomeeting.com\/work-remote?clickid=RFlSQF3DBxyOTSr0MKVSfWfHUknShrScK0%3AhTY0&amp;irgwc=1&amp;cid=g2m_noam_ir_aff_cm_pl_ct\" rel=\"nofollow\">LogMeIn<\/a>, <a href=\"https:\/\/www.multichannel.com\/news\/charter-opening-wi-fi-hotspots-in-face-of-covid-19\" rel=\"nofollow\">Spectrum<\/a> and others are offering free tools to help customers manage security and communications during the outbreak.<\/li>\n<\/ul>\n<div class=\"end-note\">\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a> to comment on topics that are top of mind.<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3532440\/coronavirus-challenges-remote-networking.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nAs the coronavirus spreads, many companies are requiring employees to work from home, putting unanticipated stress on remote networking technologies and causing bandwidth and security concerns.Businesses have facilitated brisk growth of teleworkers over the past decades to an estimated 4 million-plus. The\u00a0meteoric\u00a0rise in new remote users expected to come online as a result of the novel coronavirus calls for stepped-up capacity.Research by VPN vendor Atlas shows that VPN usage in the U.S. grew by 53% between March 9 and 15, and it could grow faster.\u00a0VPN usage in Italy, where the virus outbreak is about two weeks ahead of the U.S., increased by 112% during the last week. &#8220;We estimate that VPN usage in the U.S. could increase over 150% by the end of the month,&#8221; said Rachel Welch, chief operating officer of Atlas VPN, in a statement.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":33863,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[812,762,307],"class_list":["post-33862","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-data-center","tag-networking","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Coronavirus challenges remote networking 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/coronavirus-challenges-remote-networking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Coronavirus challenges remote networking 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/coronavirus-challenges-remote-networking\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-16T20:02:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/coronavirus-challenges-remote-networking.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-challenges-remote-networking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-challenges-remote-networking\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Coronavirus challenges remote networking\",\"datePublished\":\"2020-03-16T20:02:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-challenges-remote-networking\\\/\"},\"wordCount\":1747,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-challenges-remote-networking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/coronavirus-challenges-remote-networking.jpg\",\"keywords\":[\"Data Center\",\"Networking\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-challenges-remote-networking\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-challenges-remote-networking\\\/\",\"name\":\"Coronavirus challenges remote networking 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-challenges-remote-networking\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-challenges-remote-networking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/coronavirus-challenges-remote-networking.jpg\",\"datePublished\":\"2020-03-16T20:02:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-challenges-remote-networking\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-challenges-remote-networking\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-challenges-remote-networking\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/coronavirus-challenges-remote-networking.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/coronavirus-challenges-remote-networking.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-challenges-remote-networking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Center\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/data-center\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Coronavirus challenges remote networking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Coronavirus challenges remote networking 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/coronavirus-challenges-remote-networking\/","og_locale":"en_US","og_type":"article","og_title":"Coronavirus challenges remote networking 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/coronavirus-challenges-remote-networking\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-03-16T20:02:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/coronavirus-challenges-remote-networking.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-challenges-remote-networking\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-challenges-remote-networking\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Coronavirus challenges remote networking","datePublished":"2020-03-16T20:02:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-challenges-remote-networking\/"},"wordCount":1747,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-challenges-remote-networking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/coronavirus-challenges-remote-networking.jpg","keywords":["Data Center","Networking","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-challenges-remote-networking\/","url":"https:\/\/www.threatshub.org\/blog\/coronavirus-challenges-remote-networking\/","name":"Coronavirus challenges remote networking 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-challenges-remote-networking\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-challenges-remote-networking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/coronavirus-challenges-remote-networking.jpg","datePublished":"2020-03-16T20:02:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-challenges-remote-networking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/coronavirus-challenges-remote-networking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-challenges-remote-networking\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/coronavirus-challenges-remote-networking.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/coronavirus-challenges-remote-networking.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-challenges-remote-networking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Center","item":"https:\/\/www.threatshub.org\/blog\/tag\/data-center\/"},{"@type":"ListItem","position":3,"name":"Coronavirus challenges remote networking"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=33862"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33862\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/33863"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=33862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=33862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=33862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}