Although this migration worked fine as a band-aid, the implementation of remote working takes more than expected (and this is not about children interrupting a BBC news interview, although this one’s epic).
Use Strong Passwords
Long and unique passwords are utterly important – they provide essential protection from hacking and identity theft. With that being said, avoid using the following combinations:
And remember: whatever password you go for, never store your list of passwords on your device in plain text.
Also, 2-step verification is a great anti-hacking measure, serving as an additional layer of security. Or, to make your life easier, install NordPass on your devices. NordPass helps you create strong and difficult-to-crack passwords.
Use Business Devices (If Possible)
However, since the pandemic cracked open, people are less likely to have somebody over, so this con is leveled off.
A Phish is Still a Phish Even at Home
With many companies around the globe rolling out work-from-home arrangements, cybercriminals are already looking to cash in on the trend. Typically, phishing emails will target remote workers in a bid to get hold of their personal data or get access to company accounts.
Thus, in one phishing campaign featured by security researchers at Minecast Threat Intelligence,cybercriminals are sending out remote workers a credential-stealing scamthat takes employees to a fake OneDrive login. Cybercriminals are using COVID-19 as a subject matter for this phishing scam.
Even if you follow a link and end up on a legitimate-looking site, make sure to check its trustworthiness before giving out any personal data.
Ideally, limit your online visits to your go-to websites and don’t give away your credentials like it’s a party flyer. After all, you don’t come up to the strangers in the street and blurt out your card details, do you?
Whereas, your company is accountable for the necessary infrastructure and applicable security guidelines and plans, try to minimize your exposure to cybersecurity risks, from your part. We hope that with these practices you can get started with making your home office running in a safe way.
Subscribe to HackerNoon’s newsletters via our subscription form in the footer.