Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • 6 Cybersecurity Tips for Working from Home
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

6 Cybersecurity Tips for Working from Home

5 years ago Lilie Matia
6 Cybersecurity Tips for Working from Home

Here at Tripwire, we, like many others, recently surpassed the one-year anniversary of working from home due to the COVID-19 pandemic. Since March of 2020, we have converted kitchens, spare bedrooms and garages into office spaces. Our pets and children have become our coworkers, and companies are reporting a sudden increase in shirt sales as opposed to pant sales.

This unique transition has required flexibility to adapt to a new environment, and with that new environment has come a different set of security practices. Although many of us have finally established a rhythm when it comes to working from home, it is worth reminding ourselves of some important security practices every remote employee should be implementing.

Lock your devices

Be sure to lock devices when you step away from the desk. It is important to keep sensitive information hidden from children, partners, roommates and visitors. On most devices, this can be done via a quick keyboard shortcut. If you are diligent about doing this, it can become habit, and you no longer have to think twice about locking your screen as you get up from the chair. This shortcut is Command + Control + Q on a Mac and Windows + L (for “lock”!) on a Windows machine. Give it a try!

Secure your router’s password

Many of us were not the ones to manually set up our home’s router, so what you may not know is that your router, just like your wireless access, can be logged into. Once you’ve logged in via a username and password, you can make changes to network settings. As with any other piece of software, this can be problematic if an unwanted user gains access. Routers are often set up with very basic passwords by default, such as “admin” or “12345.” This should be changed and hardened like any other password should be. Bonus points for keeping this password in your password manager!

Personal devices vs. work devices

Do what you can to keep personal devices separate from your work devices. Because your personal devices likely are not being monitored by your IT department for software updates and vulnerabilities, avoid using your personal laptop and mobile phone for things that can be done on work laptops and mobile phones. Although it may seem like a hassle to use an entirely separate device to pay a bill, message a friend or send a personal email, make every effort to do so anyway. This can also increase your ability to separate your work life from your personal life at home, an extremely important skill when it comes to prioritizing your mental health and thriving in the midst of a global pandemic.

The latest security news

Keep up with security news and share your findings with your coworkers. Dedicate some time on a regular basis to read up on the latest security news to stay in the know about recent vulnerabilities, attacks and breaches. Consider subscribing to news sites that send out weekly digests to reduce the cognitive load of searching for the latest news manually. It is especially important to keep an eye on third-party software you and/or your company uses. If third-party software is compromised, there is the possibility for a man-in-the-middle attack, a threat which can in turn negatively affect you and your company. By staying up to date, you will consistently be reminded about some of the most frequent and dangerous kinds of attacks, such as phishing scams, that continue to be detrimental to organizations of all kinds.

Use a VPN and avoid public Wi-Fi networks

As we head into spring, where the weather begins to improve and public spaces begin to open up safely, the thought of working somewhere outside of your home office, such as a local coffee shop or neighborhood park, is tempting. However, working in a public space can usher in a myriad of security problems. Passersby can look over your shoulder onto your laptop screen or eavesdrop on your phone conversations, WiFi networks can be insecure, and the chance of leaving a device in a place where it might easily be stolen increases. Take these risks into consideration as you take advantage of the flexibility of working from home. If you feel the need to get outside or step away from the office, consider going on a walk over your lunch break or finding a more secure outdoor office space such as an enclosed backyard.

Prioritize your mental health

If you happen to find yourself worn out or exhausted from working at home, consider taking a mental health day or two to get out of the “office” and recharge. It can be all too easy to forego important security practices when we feel exhausted from performing our jobs and even more so remotely. Do yourself (and your company!) a favor by taking the utmost care of you and your workspace.

Working from home has certainly been a unique challenge that many of us were not prepared for. Whether our future contains safely returning back to the office, remaining in a work-from-home setting or a combination of the two, these basic security practices are applicable to wherever you take your work. They even apply to your home environment, work from home or not! Remember, security is everyone’s responsibility.

The post ” 6 Cybersecurity Tips for Working from Home” appeared first on TripWire

Source:TripWire – Lilie Matia

Tags: COVID-19, Phishing, TripWire

Continue Reading

Previous NitroRansomware Asks for $9.99 Discord Gift Codes, Steals Access Tokens
Next Lazarus APT Hackers are now using BMP images to hide RAT malware

More Stories

  • Cyber Attacks
  • Data Breach

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

3 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

7 hours ago [email protected] (The Hacker News)
  • Data Breach

The Buyer’s Guide to AI Usage Control

9 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

10 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

14 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

15 hours ago [email protected] (The Hacker News)

Recent Posts

  • AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
  • ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
  • The Buyer’s Guide to AI Usage Control
  • Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
  • Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT