ESET: Five tips for safe teleworking from home

ESET: With the new data of the coronavirus pandemic, a large number of employees are forced to work from home, without the usual protection of corporate networks.

This fact greatly increases the chances of an attack on one's digital assets and requires greater responsibility, both from the employees and from the managements of the companies. According to ESET, by taking the following steps, employees of any company can greatly strengthen their digital security against a potential attack.

ESET

1. Check home router settings and change the defaults.  Cybercriminals may attempt to "hack" your router and gain access to your network, so it's essential to check your router's settings. Usually, by typing https://192.168.1.1 in the browser, you can see the control panel, and from there change many settings that are directly related to your security. Make sure you change the default usernames and passwords. You will also need to change your home network name (SSID).

Router Default Passwords all on your screen without installation

2. Scan the home network for unwanted devices.  Use scan tools to find unwanted devices on your home network. Then change the password and turn off unrecognized devices on your network.

3. Firmware update, replacement of old router models. ESET researchers recently discovered the vulnerability Krøk in billions of Wi-Fi chips used in routers, which proves how important it is to update the firmware to the latest version provided by the manufacturer. If you have an older type of router, ESET suggests replacing it, looking for a model with features that can offer greater security to your home network, such as and exclusion , phishing sites and other network-level threats, for every device connected to the router in your home.

4. Use VPN network to encrypt communication. Employees who need access to της εταιρείας ενώ εργάζονται από απόσταση είναι ασφαλέστερο να χρησιμοποιούν δίκτυο VPN. Με τον τρόπο αυτό, τα μικρά πακέτα that make up the communication can remain encrypted as it travels across the internet, and only visible on employee devices and the corporate network.

5. Use of two-factor authentication (2FA). Employees using remote access technologies, such as Remote Desktop Protocol (RDP), are quite exposed to attacks. For this reason, if possible, it is a good idea to use 2-step authentication (2FA) solutions. Even if an attacker violates the passwords, with 2FA he can not proceed, as it is required to enter another one-time password, which is usually received through an authentication or SMS application.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).