Remote Work – 10 Online Security Measures You Should Know About New Coronavirus Infectious Disease Pandemic Home Work 

Until a decade ago, working from home was a luxury work style that was limited to some people. However, nowadays, people all over the world are refraining from going out due to the spread of the new coronavirus infection, and working from home is indispensable.

 

However, cybercrime and fraud taking advantage of this situation are also increasing.

 

Therefore, it is very important to carefully consider security while working from home.

 

Working from home has many security challenges that both businesses and employees need to understand. However, with proper protection, most threats can be easily prevented.

One of the most effective and simple measures that is generally recommended is to deploy a comprehensive security product.

 

According to one estimate, companies worldwide suffer $ 1.5 billion annually as a result of cybercrime. In addition, this number is expected to increase further this year. This is because cybercriminals are trying to access sensitive files by exploiting home Internet networks and corporate VPNs.

 

Such attacks can put businesses and employees at risk from ransomware attacks, DDoS attacks, malware, spyware, and more.

 

It's easy to think that you're okay, and that you're okay if you're a tech-savvy employee, but keep in mind that your kids and family can use your business computer.

 

Therefore, it is important to alert employees not to let their families use devices such as work laptops and mobile devices. Also, communicate the importance of password-protecting your device to prevent third parties from accessing sensitive files.

 

In the future, you will have more opportunities to participate in conference calls and video calls using webcams.

 

In fact, many self-restraints around the world have begun to use webcam chat to "drink" with colleagues, take language lessons in their spare time, and make video calls with family members living away. I'm doing it.

 

However, be aware that cybercriminals with high technology can easily gain unauthorized access to your webcam and invade your privacy. In addition, if you have confidential documents in your workplace, your webcam can be "hijacked" and stolen.

 

If your webcam is external, be sure to turn it off when you are not using it. If you have a built-in webcam, you need to take more measures. We don't know when a webcam attack will occur.

 

Nowadays, sliding webcam covers are on sale, and you can search the Internet for various products that meet your needs, such as size, shape, and color. Most products are very easy to install and can be glued to fit your webcam.

 

If you are using video conferencing software, some software can take advantage of the "Background Blur" feature. With this feature, even if you see important data about yourself or your customers in the background of your room, you can hide it from meeting participants.

 

 

Remote Work – 10 Online Security Measures You Should Know About New Coronavirus Infectious Disease Pandemic Home Work

Until a decade ago, working from home was a luxury work style that was limited to some people. However, nowadays, people all over the world are refraining from going out due to the spread of the new coronavirus infection, and working from home is indispensable.

 

However, cybercrime and fraud taking advantage of this situation are also increasing.

 

Therefore, it is very important to carefully consider security while working from home.

 

Working from home has many security challenges that both businesses and employees need to understand. However, with proper protection, most threats can be easily prevented.

 

Here are 10 steps you can take to maintain good security while working from home.

 

 Introduce comprehensive security products

One of the most effective and simple measures that is generally recommended is to deploy a comprehensive security product.

 

According to one estimate, companies worldwide suffer $ 1.5 billion annually as a result of cybercrime. In addition, this number is expected to increase further this year. This is because cybercriminals are trying to access sensitive files by exploiting home Internet networks and corporate VPNs.

 

Such attacks can put businesses and employees at risk from ransomware attacks, DDoS attacks, malware, spyware, and more.

 

Security products are easy to protect because they include protection that automatically addresses a number of threats, including:

 

Zero-day attack (a virus that exploits its weaknesses before a security flaw is fixed)

Malware, spyware, viruses

Trojans and worms

Phishing scams (including those sent by email)

Comprehensive security products not only can strongly block threats via the Internet, but also respond to new types of threats by regularly updating protection technology.

 

It also runs in the background without disturbing other operations, so it doesn't get in the way while it's running.

  Don't let your family use your work device

It's easy to think that you're okay, and that you're okay if you're a tech-savvy employee, but keep in mind that your kids and family can use your business computer.

 

Therefore, it is important to alert employees not to let their families use devices such as work laptops and mobile devices. Also, communicate the importance of password-protecting your device to prevent third parties from accessing sensitive files.

 

Working from home? Follow our tips to protect yourself online

Introduce a sliding webcam cover

In the future, you will have more opportunities to participate in conference calls and video calls using webcams.

 

In fact, many self-restraints around the world have begun to use webcam chat to "drink" with colleagues, take language lessons in their spare time, and make video calls with family members living away. I'm doing it.

 

However, be aware that cybercriminals with high technology can easily gain unauthorized access to your webcam and invade your privacy. In addition, if you have confidential documents in your workplace, your webcam can be "hijacked" and stolen.

 

If your webcam is external, be sure to turn it off when you are not using it. If you have a built-in webcam, you need to take more measures. We don't know when a webcam attack will occur.

 

Nowadays, sliding webcam covers are on sale, and you can search the Internet for various products that meet your needs, such as size, shape, and color. Most products are very easy to install and can be glued to fit your webcam.

 

If you are using video conferencing software, some software can take advantage of the "Background Blur" feature. With this feature, even if you see important data about yourself or your customers in the background of your room, you can hide it from meeting participants.

 

Check if your company's VPN is secure

While working from home, you will also have more opportunities to connect to your company's virtual private network ( VPN ). However, using a VPN also creates the risk of a "backdoor" that can lead to intrusions and cyber attacks.

 

First and foremost, it is important to make employees aware of and comply with the security policy regarding telecommuting.

 

Based on that, let's take measures to use VPN more safely.

 

Use the strongest authentication method possible : Many VPNs simply use a username and password to authenticate, but it's a good idea to consider upgrading to a stronger authentication that uses a smart card.

Strengthen VPN access encryption : For example, if you are only using the Point-to-Point Tunneling Protocol consider upgrading to the Layer 2 Tunneling Protocol 

Make sure your employees use secure passwords : No matter how strong your VPN is, if your employee's password is compromised , cybercriminals can easily access your VPN. To prevent this, update everyone's password and change it to a stronger and more secure password.

Only use VPNs when employees need them : If employees also use their work laptops privately, set rules to turn off VPNs during private use. Let's do it.

Make sure your employees use a secure network : While working from home, your employees may use your home network and Internet services. Unfortunately, there is a danger of being compromised from there. Inform your employees how to set up wireless routers and personal firewalls, how to keep your home network secure, and more.

In addition, as mentioned earlier in this article, you also need to install a security product that also supports VPN .

 

 Use a centralized storage solution

Whenever a company uses a storage service in the cloud or on a server, all employees must use this service.

 

If employees are unfamiliar with or unfamiliar with storage services, or may have files stored locally on their devices, contact them as soon as possible to take advantage of the services centrally managed by the company. Please contact me.

 

That way, if you are the victim of an intrusion and the files stored on your device are damaged or erased, you are more likely to be able to recover your important data from backup.

 

You can also firewall your centrally managed storage solution to make your sensitive data more secure.

 

Working from home --Secure your home wireless network

 Protect your home wireless network

It's also important to strengthen the security of your home Wi-Fi network.

 

Be sure to inform your employees to protect their home Wi-Fi network when working from home.

 

To strengthen the security of your home Wi-Fi network and protect yourself from unauthorized intrusions, the following measures are effective.

 

Set a strong password that you haven't reused: To do this, go to the router's settings page (enter "168.1.1" in your browser), enter your current username and password, and enter the settings page. Change the password with. Choose a password that is not easy to guess. Ideally, it is a combination of lowercase letters, uppercase letters, numbers, and symbols.

Change the SSID – The SSID is the name of your wireless network. This can also be changed on the router settings page. Make it something like a cipher that is hard to guess. Please do not use personally identifiable items such as your name and address.

Enable network encryption : This can usually be done in the security settings on the wireless settings page. You can choose from a variety of security methods, including WEP, WPA, and WPA2. If you're using new hardware (since 2006), choose the most powerful 

Restrict access by MAC address : Every device that connects to the network has a unique MAC address (you can find the address of each device by typing " all" at the command prompt). .. If you know the MAC address of the device, you can add it to your wireless router settings so that only that device can connect to your Wi-Fi network.

Firmware upgrade : The vendor of your wireless network device may release patches or software updates. It may contain important security updates, so be sure to visit your router's configuration page regularly to make sure you have the latest version of the firmware installed.

 Pay attention to security during video conferencing

As telecommuting becomes more widespread, there will be more opportunities to use video conferencing software during work.

 

However, the news has recently been that some video conferencing services have had security issues.

 

The popular video conferencing platform Zoom acknowledges that it is urgently addressing software security flaws, and the company is taking steps to improve privacy and security. This is because so-called "Zoom bombings" are occurring one after another. This is the act of an uninvited person accessing someone else's video conference to get in and mischief or harass a participant (many such cases have already occurred). If you primarily use Zoom as your video conferencing tool, keep in mind these risks.

 

If a video conference is compromised and the content of the conference is monitored, confidential information about business and customers can be leaked, which poses a great risk to the company. Employees who have been severely harassed or attacked by cybercriminals can also be traumatized.

 

With the confirmed attack on Zoom, the FBI has released a note on using video conferencing software.

 

 

Like it on Facebook, Tweet it or share this topic on other bookmarking websites.
  • No replies found for this topic.
You do not have permissions to reply to this topic.

What is considered cheating in a marriage?

How many of you consider the following as cheating in a relationship? I am not listing the ones that are obvious and are definite indicators of cheating.
No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 5 answer(s).
/polls/family-and-home/6506-what-is-considered-cheating-in-a-marriage.json?task=poll.vote
6506
KxoMnSqKXzVP0l1J
radio
[{"id":"22605","title":"Talking to someone you know personally or a stranger (from the opposite gender on phone\/chat messenger\/internet) without the knowledge of your spouse on a regular basis or intermittently","votes":"8","type":"x","order":"1","pct":14.81,"resources":[]},{"id":"22606","title":"Sharing one\u2019s day to day activities, desires, aspirations, and similar stuff with a person of the opposite gender other than your spouse","votes":"5","type":"x","order":"2","pct":9.26,"resources":[]},{"id":"22607","title":"Be still in touch with your girl friend \/ boy friend over phone or through internet when married","votes":"7","type":"x","order":"3","pct":12.96,"resources":[]},{"id":"22608","title":"All of the above","votes":"27","type":"x","order":"4","pct":50,"resources":[]},{"id":"22609","title":"None of the above","votes":"7","type":"x","order":"5","pct":12.96,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
bottom 200