ESET: Five tips for safe teleworking from home

ESET: With the new data of the coronavirus pandemic, a large number of employees are forced to work from home, without the usual protection of corporate networks.

This fact greatly increases the chances of an attack on one's digital assets and requires greater responsibility, both from the employees and from the managements of the companies. According to ESET, by taking the following steps, employees at any company can greatly strengthen their digital against a possible attack.

ESET

1. Check home router settings and change the defaults.  Cybercriminals may attempt to "hack" your router and gain access to your network, so it's essential to check your router's settings. Usually, by typing https://192.168.1.1 in the browser, you can see the control panel, and from there change many settings that are directly related to your security. Make sure you change the default usernames and passwords. You will also need to change your home network name (SSID).

Router Default Passwords all on your screen without installation

2. Scan the home network for unwanted devices.  Use scan tools to find unwanted devices on your home network. Then change the password and turn off unrecognized devices on your network.

3. Firmware update, replacement of old router models. Recently, ESET researchers discovered the Krøk in billions of Wi-Fi chips used in routers, which proves how important it is to update the firmware to the latest version provided by the manufacturer. If you have an older router, ESET suggests replacing it, looking for a model with features that can provide greater security to your home network, such as detecting and blocking malware, phishing sites and other network-level threats, for each which is connected to the router in your home.

4. Use VPN network to encrypt communication. Employees who need access to the company's intranet while working remotely are safer to use a VPN network. In this way, the small data packets that make up communication can remain encrypted as they travel across the Internet, and are only visible on employees' devices and the corporate network.

5. Use of two-factor authentication (2FA). Employees using remote access technologies, such as Remote Desktop Protocol (RDP), are quite exposed to attacks. For this reason, if possible, it is a good idea to use 2-step authentication (2FA) solutions. Even if an attacker violates the passwords, with 2FA he can not proceed, as it is required to enter another one-time password, which is usually received through an authentication or SMS application.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).