ESET: Five tips for safe teleworking from home

ESET: With the news of the coronavirus pandemic, a large number of workers are being forced to work from home, without the usual protection of corporate networks.

This significantly increases the chances of attacking a company's digital assets and requires greater responsibility, both from employees and company management. According to ESET, by taking the following steps, employees of any company can greatly enhance their digital security against a potential attack.

ESET

1. Check home router settings and change the defaults.  Cybercriminals may attempt to "hack" your router and gain access to your network, so it's essential to check your router's settings. Usually, by typing https://192.168.1.1 in the browser, you can see the control panel, and from there change many settings that are directly related to your security. Make sure you change the default usernames and passwords. You will also need to change your home network name (SSID).

Router Default Passwords all on your screen without installation

2. Scan the home network for unwanted devices.  Use scan tools to find unwanted devices on your home network. Then change the password and turn off unrecognized devices on your network.

3. Firmware update, replacement of old router models. ESET researchers recently discovered the vulnerability Krøk in billions τσιπ Wi-Fi που χρησιμοποιούνται σε router, γεγονός που αποδεικνύει πόσο σημαντικό είναι να ενημερώνεται το firmware με την τελευταία provided by the manufacturer. If you have an older router, ESET suggests replacing it, looking for a model with features that can provide greater security to your home network, such as detecting and blocking malware, phishing sites and other network-level threats, for every device connected to the router in your home.

4. Use VPN network to encrypt communication. Employees who need to access the company intranet while working remotely are safer using a VPN network. In this way, the small packets of data that make up the communication can remain encrypted as they travel across the , and be visible only on employees' devices and on the corporate network.

5. Use of two-factor authentication (2FA). Employees using remote access technologies, such as Remote Desktop Protocol (RDP), are quite exposed to attacks. For this reason, if possible, it is a good idea to use 2-step authentication (2FA) solutions. Even if an attacker violates the passwords, with 2FA he can not proceed, as it is required to enter another one-time password, which is usually received through an authentication or SMS application.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).