{"id":5424,"date":"2020-04-03T16:33:40","date_gmt":"2020-04-03T16:33:40","guid":{"rendered":"https:\/\/cmitsolutions.com\/stamford\/?p=5424"},"modified":"2023-02-12T23:39:28","modified_gmt":"2023-02-13T05:39:28","slug":"the-security-of-your-home-work-environment","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/stamford-ct-1161\/blog\/the-security-of-your-home-work-environment\/","title":{"rendered":"Work at Home Security Tips"},"content":{"rendered":"<p>Now that the world has shifted to working from home there are new questions and concerns for employers, employees, and clients. CMIT Solutions is here to answer those for you in order to make working from home both efficient and safe.<\/p>\n<p><strong>Did you ever suspect there would be a hacker in your system?<\/strong><\/p>\n<p>This past week we addressed a client whose work email was hacked on his home computer. We also helped another client who was a victim of ransomware that resulted in the loss of company files. We even received a call from another client whose home computer was hacked, 1,000 + of his contacts were deleted, and all of his recycle bins were emptied. Do not let yourself be the next victim of hacking because of a lack of education about working safely from home.<\/p>\n<p>Below are some responses to common questions about work from home security.<\/p>\n<p>Q: All of my files are in Microsoft 365 or a Cloud-hosted application.\u00a0 The cloud is supposed to give the ability to work from anywhere, can\u2019t I just work from my home computer?<br \/>\nQ: I know about computers, I have anti-virus software installed, isn\u2019t that enough?<br \/>\nQ: What are the specific risks posed by working from a home computer?<br \/>\nQ: This won\u2019t happen to me; the probability is so small.<br \/>\nQ: What can I do to secure my home computer?<\/p>\n<p>Risks posed by at-home computers<\/p>\n<ul>\n<li>Home computer accounts run with administrative privileges allowing malware to be installed<\/li>\n<li>Malware can infect files that are then uploaded to your file server, Microsoft 365, or your cloud-hosted application<\/li>\n<li>Keylogger malware can record and transmit your password.\u00a0 MFA can be bypassed<\/li>\n<li>Workers tend to copy files locally that can then be vulnerable to malware that steals, corrupts, or infects<\/li>\n<li>Due to insufficient security on the home computer and the home network, a hacker can gain access to a computer that is interfacing with your companies systems; this includes systems that are cloud-based<\/li>\n<li>Home computers are often accessed by multiple people\u00a0who visit various websites and execute many different pieces of software, any of which can infect your computer with malware \u2013 making it easy for a hacker to attack your business the next time you remotely access your office network.<\/li>\n<li>Home computers usually use\u00a0<a href=\"http:\/\/www.prweb.com\/releases\/worst\/passwords\/prweb13170789.htm\">weak passwords<\/a>\u00a0or no passwords at all, making it easy to gain access to your machine, which can then be used to access your office data if you remotely connect to your business\u2019s network.<\/li>\n<li>Most\u00a0<a href=\"https:\/\/www.networkworld.com\/article\/2905562\/security0\/antivirus-doesn-t-work-so-why-are-you-still-using-it.html\">consumer-ready antivirus products won\u2019t stop sophisticated hackers<\/a>\u00a0targeting your organization\u00a0\u2013 which is what most home computers are running.<\/li>\n<li>VPN connections without MFA can be hacked<\/li>\n<li>Most cloud-based applications don\u2019t scan incoming files for malicious code<\/li>\n<li>Connecting to an unsecured Wi-Fi network, visiting malicious sites, and downloading hazardous software are practices that many endpoint users engage in \u2013 making a <a href=\"http:\/\/solidsystemsllc.com\/prevent-man-in-the-middle-attacks\/\">man-in-the-middle attack<\/a>\u00a0and other hacking methods for infecting your computer very easy.<\/li>\n<li>Even if your VPN is secure, the infected machine can grant the hacker access to your companies private network.<\/li>\n<\/ul>\n<p><strong>How to secure your home computer<\/strong><\/p>\n<ol>\n<li>Install business-grade endpoint protection<\/li>\n<li>Make sure operating system and third-party software is updated regularly<\/li>\n<li>Install a DNS filtering tool<\/li>\n<li>Turn on Windows Firewall<\/li>\n<li>Fresh install of the operating system<\/li>\n<li>Update BIOS and drivers<\/li>\n<li>Uninstall all unnecessary software (each installed software is a security risk if it is not patched)<\/li>\n<li>Change the local account you are using to \u201cstandard\u201d so that the account doesn\u2019t have administrator privileges<\/li>\n<\/ol>\n<p><strong>How to secure your home network<\/strong><\/p>\n<ol>\n<li>Update the firmware on all network equipment; modems, routers, network switches, wifi equipment, IoT (internet of things) devices, printers<\/li>\n<li>Set up secure wifi<\/li>\n<li>Buy and configure a business-grade firewall or at least a router<\/li>\n<li>Have a separate network for work<\/li>\n<\/ol>\n<p><strong>How CMIT can help<\/strong><\/p>\n<ol>\n<li>If you are a client and have an unlimited Help Desk we can install our management and security licenses at no cost.\u00a0 Call 203-595-9091 option 2 to start the process.\u00a0 You now have the most important items 1-4 taken care of.<\/li>\n<li>Call and ask for an appointment for a \u00a0home network review and we can assist you in putting together a plan to handle items 5-12.<\/li>\n<\/ol>\n<p><strong>Reference Articles<\/strong><br \/>\nThe Ultimate Guide to Secure Remote Work<br \/>\n<a href=\"https:\/\/andersontech.com\/taking-work-home-secure\/\">https:\/\/andersontech.com\/taking-work-home-secure\/<\/a><\/p>\n<p>12 ways to Hack Multi-Factor Authentication<br \/>\n<a href=\"https:\/\/www.secureworldexpo.com\/industry-news\/12-ways-how-to-hack-multi-factor-authentication-mfa\">https:\/\/www.secureworldexpo.com\/industry-news\/12-ways-how-to-hack-multi-factor-authentication-mfa<\/a><\/p>\n<p>4 Remote Access Risks and How to Solve Them<br \/>\n<a href=\"http:\/\/solidsystemsllc.com\/remote-access-risks\/\">http:\/\/solidsystemsllc.com\/remote-access-risks\/<\/a><\/p>\n<p>Virus Detection in SharePoint Online<br \/>\n<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/virus-detection-in-spo?view=o365-worldwide\">https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/virus-detection-in-spo?view=o365-worldwide<\/a><br \/>\nFor Small Business Owners \u2013 CyberSecurity Training from KnowBe4 \u00a0<a href=\"https:\/\/tinyurl.com\/w9sk9vt\">https:\/\/tinyurl.com\/w9sk9vt<\/a><\/p>\n<p>Linda Kuppersmith<\/p>\n<p>203-595-9091 x3040<\/p>\n<p><a href=\"mailto:lkuppersmith@cmitstamford.com\">lkuppersmith@cmitstamford.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Now that the world has shifted to working from home there are&#8230;<\/p>\n","protected":false},"author":135,"featured_media":6646,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,17],"tags":[],"class_list":["post-5424","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lindas-tech-tips","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/stamford-ct-1161\/wp-json\/wp\/v2\/posts\/5424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/stamford-ct-1161\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/stamford-ct-1161\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/stamford-ct-1161\/wp-json\/wp\/v2\/users\/135"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/stamford-ct-1161\/wp-json\/wp\/v2\/comments?post=5424"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/stamford-ct-1161\/wp-json\/wp\/v2\/posts\/5424\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/stamford-ct-1161\/wp-json\/wp\/v2\/media\/6646"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/stamford-ct-1161\/wp-json\/wp\/v2\/media?parent=5424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/stamford-ct-1161\/wp-json\/wp\/v2\/categories?post=5424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/stamford-ct-1161\/wp-json\/wp\/v2\/tags?post=5424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}