3.) Do not click on links or attachments without checking them first
Phishing via links and attachments in emails is still by far the most common infection vector for ransomware , backdoor Trojans, cryptominers or adware and other forms of malware. Checking links and files before clicking on them is like washing your hands to prevent corona virus transmission. Only the advice is to do this not just "frequently," but always.To check a link, hover your mouse cursor over the hyperlink (e.g., https://www.cryptron.ch) above it, usually colored blue, to see if it points to the expected location. Copying and pasting the link into your browser instead of running it directly in your email client is also a useful habit. Further, it is recommended to have strange URLs checked automatically with, for example, VirusTotal.
4. ) Out of office messages (Out of office).
If external emails result in an automated response that you are out of the office until next week, or on maternity leave, or were skiing in the mountains until Friday, you have provided valuable information to scammers, spammers and criminal hackers alike . There's no need to tell the world you're unavailable, just your colleagues and your boss - business emails should be forwarded to an alternate contact who can handle requests in your absence.
5.) Multi Factor Authentication
Credential theft is high on every attacker's agenda, but there are simple steps you can take to minimize this risk for the vast majority of attacks.
First, enable 2-factor or multi-factor authentication for all accounts that support it. Short-term code generators such as those from Google and Microsoft Authenticator should be used whenever possible. Also, use a password manager to ensure you generate unique passwords for each account and use a different password for each service on the Internet. Biometric authentication options are, of course, increasingly in use today and can be used selectively depending on requirements.
6.) Public WLAN hotspots
Use your personal hotspot on your smartphone when you are not at home or in the office. Public WLAN is inherently insecure because all other users on the same WLAN network can eavesdrop on traffic, among other things. If for some reason you can't avoid using unprotected public WLAN, make sure you use encrypted email, messaging, and communication channels like VPN to work securely on the go. Never do things like payment processing or banking while connected to a public Wi-Fi hotspot.
7.) Do not mix work and fun.
As a general rule, your work devices should not be required to be used for anything other than work tasks, according to company policies or directives. This is not only to protect your business, but also yours and globally, many companies do not yet have a privacy policy for data or activities in the home office or on work devices such as notebooks, tablets and smartphones with business apps. (Keyword: Compliance, GDPR)
8.) Do not ignore software and operating system updates.
This should also be mandated by company policy. However, if your device is not centrally managed by IT, you need to pay attention to software and operating system update notifications. Why is it so important to apply updates in a timely manner? As soon as vendors release a patch, hackers and reverse engineers try to figure out what the vulnerability was in the previous version and how it can be exploited. Therefore, apply security updates regularly.
9.) Have you been hacked, what to do?
If a computer has been hacked, you can no longer access your company data, the web store is down or under the control of criminal hackers, then call our Incident Response & Forensics team.
The vast majority of problems occur because one or more of the above practices were ignored. Giving criminal hackers a hard day at the office doesn't require a master's degree in cybersecurity, just an awareness and practice of the basic principles that apply whether you're working from home, in the office, or on the train while traveling.
To learn how the home of Security team can help your employees and organization stay safe in times of crisis, contact us or request a free demo of our security services, training and software solutions.