Three ways to stay cyber secure (while working from home)

April 30, 2020

In response to the COVID-19 pandemic, many Canadians are working from home. Cyber threat Cyber threatA threat actor, using the internet, who takes advantage of a known vulnerability in a product for the purposes of exploiting a network and the information the network carries. actors are always looking for ways to take advantage of security vulnerabilities, and it is important to keep your home cyber secure to prevent becoming a victim of cyber attacks.

Canadians are vulnerable to cyber attacks in which they may lose their identity, personal information and money.

As with any “bring your own device” working arrangement, it’s not just your own information that’s at risk; your organization’s information is also at risk.
To protect yourself and your organization while working from home, follow these tips.

"a laptop screen with multiple users in a video call, with two envelopes marked with the number 3"Use anti-malware software

Malware – or malicious software SoftwareA computer program that provides instructions which enable the computer hardware to work. System software, such as Windows, Linux or MacOS, operate the machine itself, and applications software, such as spreadsheet or word processing programs, provide specific functionality. – is a common method that cyber criminals use to steal information from victims. They trick you into downloading software or opening a file that looks legitimate but that is a malicious program that infects your systems and steals information from your device.

How can you protect yourself from malware MalwareMalicious software ("malware") designed to infiltrate or damage a computer system, without the owner's consent. Common forms of malware include computer viruses, worms, Trojans, spyware, and adware. It can: • Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a security problem or other false information. • Reformat the hard drive of your computer causing you to lose all your information. • Alter or delete files. • Steal sensitive information. • Send emails on your behalf. • Take control of your computer and all the software running on it. ? Use anti-malware software.

Organizations should have anti-malware software installed on work devices. If you can, use a work device when working from home.

If you’re using your own devices, then you should install anti-virus software Anti-virus softwareSoftware that defends against viruses, Trojans, worms and spyware. Anti-virus software uses a scanner to identify programs that are or may be malicious. Scanners can detect known viruses, previously unknown viruses and suspicious files. . Be sure to run software updates as they are made available.

Upgrade your Wi-Fi security

Your home Wi-Fi Wi-FiWi-Fi refers to a set of wireless communication protocols that can transmit traffic to Wi-Fi enabled devices within a local area. A Wi-Fi enabled device such as a laptop or tablet can connect to the internet when within range of a wireless network connected to the internet. An area covered by one or more Wi-Fi access points is commonly called a hotspot. network NetworkSeveral computers that are connected to one another. is another key component of making your home cyber secure. There are steps that you should take to secure your home wireless network.

One of the easiest ways to increase your home cyber security is to change your Wi-Fi password PasswordCombination of letters and numbers you select to secure an account or device. from the default DefaultA setting automatically chosen by a program or computer that remains until the user specifies another setting. that comes with your router RouterA network device that is used to establish and control the flow of data between different networks. . You should use a passphrase PassphraseCombination of random words you select to secure an account or device. or strong password.

Beware of phishing and spearphishing scams

Spearphishing is similar to phishing PhishingAn attempt by a third party to solicit confidential information from an individual, group, or organization by mimicking or spoofing, a specific, usually well-known brand, usually for financial gain.  , in that it is a message sent to trick users into disclosing personal data, but tends to be smaller in scale and well targeted. Cyber criminals can find specific information about a company or an employee to craft spearphishing attacks. Often, this information is available on company websites or social media Social mediaInternet-based tools that allow people to listen, interact, engage, and collaborate with each other. Popular social media platforms include Facebook, YouTube, LinkedIn, and Twitter. accounts.

For example, a cyber criminal creates an email account to imitate a manager or colleague. Posing as a manager, the cyber criminal asks you to click a link LinkSee Hyperlink. , download DownloadTransmission of data from a remote computer system onto a local computer system. software, or perform a task, such as buying gift cards and sending the numbers.

When working from home, we rely on email as our main form of communication. If you aren’t careful, you may be vulnerable to phishing scams.

Be diligent about double checking your emails. If you get a message that seems suspicious, think twice before opening an attachment, clicking a link, or responding.

Conclusion

Keeping your home cyber secure has always been important. But it’s never been more important than it is right now.

Follow these tips to keep your home cyber secure.

Date modified: