Cyber Security risks and how to keep safe working from home

4 mins

When remote working, what can you do to make sure you keep protected from Cyber-attacks? &...

When remote working, what can you do to make sure you keep protected from Cyber-attacks?

 Phishing
Remaining vigilant and doing simple things will help to prevent hackers from gaining access to any information and keep your business network secure.

  • If you receive an unusual email from a colleague, check that it has come from them. The true email address will be visible at the top.  If it is not, you can click on reply to see the actual address from where it has come from. Delete immediately and then inform your colleagues to be wary of such emails.
  • Phishing emails can have a business name attached to them to fool you into thinking it is an official email, such as a Banks name or Internet Provider. Use the technique above to double-check the real sender.
  • Do not open any attachments or links from senders you are not familiar with. If there is a link, by simply hovering your mouse over the link, will display what website you will be routed to.
  • If you are asked for personal and private information, do not under any circumstances respond.
  • If you are unsure of an email, speak to your IT team or forward it on so they can check for you.

Passwords
This may seem like an obvious one, but people can be lazy when it comes to passwords.

  • Use password management tools rather than local storage
  • Follow the guideline of creating strong passwords. Ensure they are at least 8 characters long and include special characters, uppercase letters and numbers.
  • Two-step authentication can provide extra security. If you are running Microsoft Windows 10, you can turn this function on and Google Authenticator can also provide extra security.

WIFI Security
With your home WIFI, there are a few things you can do to make it more secure. Some easy steps for you to follow are:

  • Change the name of your Network – Most Providers will provide you with a router with a predetermined username and password - they are typically printed on a label somewhere on the device. Many people stick with this default login, but the standard username and passwords are fairly well-known. The SSID (the name that is displayed when scanning for networks) is usually a provider-related name, eg SKYXXX, BTXXX, VMXXX, or the manufactures name, eg, Netgear, Belkin, etc. This gives the hackers information on what type of router you have and how they can exploit it to gain access. Change the name to anything you wish without giving away information.
  • Change the network Password – Just as the network name, this will usually be located on your device. Change it to ensure maximum security.
  • Deactivate WPS – Wifi Protected Setup is not available on all routers. It is a mechanism used to make the connection of wireless devices easier bypassing the need for a password. It is usually activated by a button on the device labelled WPS.  Some experts question its security and to be on the side of caution, just deactivate it in your router settings. 
  • Do not broadcast your network – It usually defaults that your network will broadcast its SSID for users to find when scanning for networks. By removing that function and keeping your network hidden will obviously make it more secure.  There are issues with doing this, as not only will unwanted devices not be able to detect your network, neither will your devices.  All it means is you will have to manually enter the network name for your devices to pick it up. 
  • Enable your router firewall – Numerous routers have programmable firewalls that can be switched on or off. Under the router settings, makes sure yours is enabled.  It's not completely infallible, but it is worth adding another security layer. The firewall will filter the data checking what is safe whilst blocking unauthorised access.  Tools such as Norton, Kaspersky include firewalls adding even more security. 
  • Ensuring the router's firmware is up to date – As with everything the router will have firmware that needs to be updated. The majority will update automatically but check your router settings to check if there is an update. 
  • Unknown Devices – Check to see what is connected to your network and make sure there are no unknown devices. You can as well, filter MAC addresses. All devices including phones will have a MAC address, if you use an iPhone you can find it under Settings>General>About>Wifi Address.  If you are using an Android under Settings>General>About>Wifi MAC Address. You can then filter MAC addresses and only accept access from approved devices.  If you are unsure how to access your Routers control settings, you can use a search engine to look it up. 
  • Never share Passwords – Keep this information private and do not divulge it with anyone outside your organisation, or household. 
  • Act with caution with downloading applications - Quite often these can hide malicious data, so check the source of where they are from and check they are from a reputable app store.



 Providing a Secure Business environment
Businesses will ensure that they provide a secure environment, with known websites, systems, software, and tools approved.  Any websites that may pose as a threat will be blocked.  The security may become compromised if employees are using devices with no supervision, uploading new tools or systems, or accessing websites.  To pre-empt any risks and security threats, you need to ensure that staff know if there is a desire or need for a new system, tool or software to be used by them, that there is a clear process for giving approval and integration into your systems.

 Communication
As with every eventuality, communication is key. With organisations varying in size, industry and sector, different security challenges that will require a much wider scope of security measures to be put in place. Keeping the flow of information cascading through the ranks and encouraging staff to report anything they suspect is imperative.  Information is power and warnings about what they should be on the lookout for is important.  As is the information from yourselves and how you are combating the potential cyber-attacks and what extra measures you are putting in, will reassure your employees.