Blog

3 Steps Towards a Strong Home (Cyber) Security System

You’re wearing your mask, working from home and generally keeping your distance. You’re doing your part to stop the spread of COVID-19, but are you taking all possible precautions? What are you and your company doing to boost your immunity to cyber security threats?

In the absence of an on-premises IT department, protection of your company’s data falls to individual employees. It is crucial that employees working from home follow the guidelines below to build a strong and unified cyber security system.

1. Keep Devices Strictly Business

A work from home environment creates unique vulnerabilities that cyber criminals are eager to exploit. This is why sensitive data should be kept within pre-approved channels where it can be adequately monitored and managed. Never save sensitive data to your desktop or unauthorized cloud storage accounts. You should also avoid sending sensitive data via email, team chat, or personal devices.

Speaking of personal devices, do not plug USB devices that are not pre-approved by your IT department into a company device. Personal USB devices may be insufficiently secure, especially if you do not have encryption enabled.

Indeed, it is best to refrain from using any personal devices without the knowledge and approval of your IT department.

2. Ensure Passwords Pass Inspection

When inventing passwords for different accounts, be sure to vary password usage. All of the passwords you use should be unique for each account and difficult for a potential attacker to guess. Creative passwords minimize the potential damage that a data breach could cause.

Passwords should be easy to remember and difficult to guess. When creating a password, try to memorize a series of unrelated words and combine them together into a passphrase. Ideally the password you come up with should not contain any personal details about you such as your birthday or your childrens’ names.

3. Read Emails Carefully

Phishers are known to impersonate legitimate people and organizations via email and they are doing it at an alarming rate since the pandemic pushed people into home offices.

To protect against phishing email attacks, never open an attachment unless you are confident that the message is from a legitimate party. Before clicking a link, hover over the link and check the bottom-left corner of your browser to see where it actually leads. Read the domain carefully to make sure that it’s a legitimate website. A misspelling or other seemingly minor inconsistency can indicate an impersonation attempt.

 

We’re all in this together—make sure that all employees are working from home with the same level of security. eMazzanti can help. Contact us today.

Recent Posts

How to Choose an Endpoint Security Solution…and Why It Matters

Think of all the devices accessing your network, from laptops and PCs to tablets and…

6 days ago

Understand the Benefits and Limitations of Automated Tools in Penetration Testing

Penetration testing, the process of simulating cyberattacks to identify vulnerabilities, plays an essential role in…

2 weeks ago

Promote Cyber Security Through Obscurity

Carl Mazzanti is the president of eMazzanti Technologies in Hoboken. Is your organization trying to…

2 weeks ago

What Is Microsoft’s Role in the Shared Responsibility Model for Data Security?

Migrating to the cloud delivers undeniable business benefits. But it also opens the door to…

3 weeks ago

Closing the Door On Global Cyber Threats

Carl Mazzanti is the president of eMazzanti Technologies in Hoboken. One of our clients —…

3 weeks ago

Microsoft Planner vs. Project: 5 Key Differences in 2024

With the new Microsoft Planner joining the Microsoft 365 universe this year, users are taking…

4 weeks ago