HWM (Singapore)

LEARN: The 2020 Covid-19 work from home guide

Also known as general cyber hygiene best practices

- Text Contribute­d by Aaron Zander, Head of IT at HackerOne

USE A GOOD PASSWORD MANAGER

Don't share logins and passwords unless you absolutely have to. And if you have to, then it's time to invest in a password manager for your team or company. Tools like 1Password make sharing large amounts of secure data easy, and help secure your teams even more.

USE MULTI-FACTOR AUTHENTICA­TION (MFA)

Authentica­tion is the process by which a computer validates the identity of a user (i.e. username and password). Two-factor authentica­tion (2FA) commonly combines a password with a phonebased authentica­tion factor. However, there are shortcomin­gs with 2FA, as hackers can bypass wireless carriers, intercept or redirect SMS codes, and easily compromise credential­s. Multifacto­r authentica­tion is more secure as it adds an additional layer of protection. Instead of just asking for a username and password, MFA requires additional credential­s, such as a code from the user's smartphone, the answer to a security question, a fingerprin­t, or facial recognitio­n.

DISCONNECT FROM THE COMPANY VPN WHEN NOT IN USE

Leaving your corporate connection­s open can increase the likelihood that if you're breached, it will extend past

your machine and into your company network. Also, in a time where many more people are connecting via these services, it'll give your IT team a little more room to breathe.

SECURE YOUR HOME ROUTER

It is essential to ensure your home Wi-fi router is up to date. Search the name of your router, and the words “breach” or “security issue” and see if yours is on the list. Most of these can be fixed by doing a simple software update. If your network equipment is no longer being updated by the manufactur­er, chances of vulnerabil­ities increase over time. It is also important to use a strong password. Make sure you’ve modified the default administra­tor password on your router and other network equipment. Ensure your wireless networks are using WPA2 security or higher. And, separate guest devices onto a separate wireless network isolated from your personal devices if you can.

DON’T SHARE YOUR ONLINE MEETING IDS OR MEETING URLS ON SOCIAL MEDIA.

Online meetings are increasing­ly productive tools that allow people to work from anywhere, not just the office. But they come with a caveat: Sharing the meeting ID or URL can allow people to drop in and listen to sensitive conversati­ons, record your voice or video, and infiltrate your new virtual workplace. Some meeting tools allow you to limit meetings to only people in your organisati­on or add a password, but not all do, especially if you're a small business and make use of basic consumer videoconfe­rencing tools.

BE EVEN MORE PARANOID OF PHISHING AND OTHER SCAMS.

If something looks suspicious, don't click or act on it. Email scams related to Covid-19 are already on the rise, and the U.S. The Department of Health and Human Services recently announced that they have fallen victim to a cyber attack that involved a Covid-19 misinforma­tion campaign that quickly spread via text, email and social media. In general, never share personal or financial informatio­n via email if you weren't expecting it. If you get such a request, it's best to call or video conference the individual directly to confirm.

EXPECT CRIMINALS TO TRY AND TAKE ADVANTAGE OF THE

INCREASED DISTANCES IN OUR WORKPLACES

Often a lot of the checks and balances around things like financial requests and last minute invites to meetings or other services are done in person. Now that they might happen via email, text or WhatsApp, be extra diligent about checking who is sending them. Phishers are going to take advantage of the lack of processes that are in place. If you get a request via email or messaging services, always try and verify outside of the initiated chain of request. For example if you get a request from your CEO to refund a customer to a new bank account, instead of replying to that thread to confirm, message them in a new email, or via a different medium (call/instant messaging etc) to verify the request. For large transactio­ns, always have another person on your team double check the request and your work as well for safety.

AVOID INSTALLING NEW APPS WITHOUT PERMISSION FROM IT

Some apps may be harmless, but installing more apps onto your work device can raise cause for concern. Employees working from home may create or take into use new software tools and services that won't be as thoroughly tested and protected as the tools they normally use, posing greater risk for the corporate network.

DON’T MIX PERSONAL AND WORKRELATE­D INTERNET BROWSING

Many digital tools and services today are web or cloud-based, i.e., accessible directly from a browser. And when you're working from home, it's very easy to start mixing work and personal browsing. If your browser supports it, maintain separate work and personal profile sessions. Or better yet, use two different browsers for work and personal browsing, so you will not accidental­ly mix them up. Lock your laptop.

LOCK YOUR LAPTOP

When we're at work, oftentimes we get really good at locking our laptops when we walk away from them, but at home we leave them unlocked, and it's a bad habit to get into. It makes it more likely to fall into this habit when you do get back to work in the office.

 ??  ??
 ??  ??
 ??  ??
 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from Singapore