Don't Forget to Share this Post

4 Tips to Bolster Security in Your Home + New Phishing Scams

By Amisha Shah | Wednesday, April 1st, 2020

As we head into another week of working from home, remote workers are reminded to assess home security measures on a weekly basis to update and/or add any defences accordingly. This practice is especially important as firms and their employees are exposed to the increasing number of Covid-19 phishing scams and cyberattacks, which are becoming more and more sophisticated and convincing by the day.

In our webinar, Eze experts shared home security essentials to maintain a robust security profile when operating from home, as well as shocking Covid-19 phishing scams we’ve come across in the past 30 days, as a trusted MSP to our hedge funds, private equity and wider investment management clients around the world. You can catch the full webinar replay here or watch it below.

In today’s blog article, we’ll cover top security essentials to help minimise vulnerabilities around the home. 

Beware of these Phishing Emails

Cybercriminals are getting creative as they prey on users’ vulnerability during this difficult time. Below are subject titles from real phishing emails Eze Castle Integration has observed over the past 30 days:

•    Covid-19 Relief measures: FINANCIAL SUPPORT WITH HSBC
•    Supplier-Face Mask/Forehead Thermometer
•    Small Business Grant/ Testing Centre Vouchers
•    COVID-19 Everything you need to know
•    Breaking!!! COVID-19 Solution Announced by WHO At Last As a total control method is discovered

Protecting Yourself from Phishing Scams

Look out for tell-tale signs such as poor spelling and grammar, unrealistic claims, threatening or urgent language used in the email. And, follow the list of don’ts below to avoid getting hooked:

•    Do not open emails from unknown senders
•    Do not open unusual emails from known senders
•    Do not trust the sender’s address – this can be spoofed very easily
•    Do not trust the padlock icon in the search bar – numerous phishing sites now have this displayed!
•    Do not open attachments in suspicious emails

When in doubt, check with your IT department or provider, who will be able to help you with determining user authenticity.

Security Essentials Not to be Overlooked

#1 Remote Access

We recommend remote desktop/application virtualisation as the most secure enabler of remote access, with an entire environment stored in a datacentre. Additionally, all web traffic is tracked by a corporate firewall and intrusion detection system to ensure complete safety when remote working. 

The remote desktop and application virtualisation access also eliminates the following risks associated with working from home:

•    Lack of control over passwords, screen lock, account lockout etc.
•    Malware from unfiltered home network
•    Attackers pivoting from home to corporate network

#2 Home Network

Adhere to the following advice and tips from our security experts to keep your home network safe from intruders:

•    Keep operating systems and applications up-to-date
•    Use an anti-malware solution on your endpoints, making sure all features are enabled and definitions are up-to-date
•    Use DNS filtering on your machines or set it up at the router level
•    Use full disk encryption on all devices if possible
•    Ensure wiring closets and ISP hand-off points are secured
•    Consider using MAC address filtering

#3 Effective WiFi Management 

Here are some pointers on how you can you manage your WiFi for complete protection:

•    Change the default username and password on your wireless router
•    Disable remote management
•    Use WPA2 or WPA3 for wireless traffic encryption
•    Use lengthy and complex wireless passwords
•    Disable WPS and UPnP
•    Keep separate networks for your computers, IoT devices, and guests
•    Routinely monitor who is connected to your wireless network

#4 Protecting your IoT Devices 

Hints to protect your devices at home:

•    Change default passwords on all IoT devices
•    Keep your IoT devices on a separate wireless network or VLAN
•    Restrict information sharing between IoT devices and 3rd party vendors
•    Use a firewall where possible, especially as hackers are seen to be intruding through less strong devices such as external cameras and smart doorbells 

Watch the replay here to listen in on the full discussion.

Don't Forget to Share this Post

Related Posts

How Can Eze Castle Integration help you?Contact us today!

Contact Us