Cyber Security Tips for Working from Home
The current technologies enable us to control our home devices on our smartphones from any location. While many of us are also working from home, phishing, scams, malware and other cyber-related threats are becoming more frequent. Cybercriminals often rely on human error ― clicking on malicious link in email or failing to update the antivirus or to install software patches. Cybersecurity is everyone’s job and requires everyone’s participation from the top management to the newest employees. #BeCyberSmart and support the National CyberSecurity Awareness Month (NCSAM) with CyberNINES. Share these tips with your organization and start securing your home environment.
- Secure your Wi-Fi Network. Secure your home’s Wi-Fi network by changing the factory-set default password and username. Make your password complex as wireless router is the primary entrance for cybercriminals to access all of your connected devices.
- Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring.
- Treat business information as personal information. Business information might also include employee personally identifiable information (PII) through tax forms and payroll accounts. Do not share proprietary data and PII with unknown parties or over unsecured networks.
- If You Connect IT, Protect IT. Whether it’s your computer, smartphone, game device, or other network devices, the best defense against viruses and malware is to update to the latest security software, web browser, and operating systems. Sign up for automatic updates, if you can, and protect your devices with anti-virus software.
- It only takes one time. Data breaches do not typically happen when a cybercriminal has hacked into an organization’s infrastructure. Many data breaches can be traced back to a single security vulnerability, phishing attempt, or instance of accidental exposure. Do not click on unknown links and delete suspicious messages immediately.
- Social media is part of the fraud toolset. Cybercriminals search for any information about the target company using the search engines or social media. Avoid oversharing any company information on social media or conducting business, payments, or sharing PII on social media platforms.
- Verify any requests by phone or in-person. Many cyber-attacks pretend to be another company or an insider management while requesting for company’s money or information. Avoid this pitfall by directly calling or talking with the person who is requesting the receiver’s input.