Medical
  • Articles
  • April 2020

Is Your Home Office Secure? How to Limit Cybersecurity Risks while Working Remotely

Cybersecurity wired house
In Brief

Malicious actors 鈥 from common fraudsters to sophisticated cybercriminals 鈥 exploit vulnerabilities, and the COVID-19 pandemic presents an exceptional opportunity. As the industry shifts to remote operations, insurers must redouble efforts to protect against online scams and cyberattacks. 国标麻豆视频APP Dean Bryant shares a path forward. 


Unfortunately, malicious actors 鈥 from common fraudsters to sophisticated cybercriminals 鈥 understand this all too well and are exploiting the current norm-altering COVID-19 pandemic and remote-work culture to launch online scams and cyberattacks.

For those of us in the insurance industry, the need for increased vigilance and hyperawareness of potential risks is paramount as we work to protect the information and financial security of all those we serve. Here are some basic steps you can take to help ensure you work as securely as possible from your home office.

Don鈥檛 get scammed

Cybercriminals continue to seize on coronavirus fears by using online scams to extract internet users鈥 personal and financial information. These scams 鈥 sent through email, texts, or social media 鈥 claim to provide coronavirus awareness, sell virus prevention products, and/or ask for donations to a virus-related charity for victims. They can often appear to be from a legitimate organization or individual, including a business partner or friend.

Tips to avoid scams:

  • Do not provide personal or financial information in an email, through text messaging, or over the phone during a call that you did not initiate. Do not respond to unsolicited requests for this information, which includes not following links sent via email or text messages.
  • Pay attention to URLs. Malicious websites can look exactly like legitimate sites, but the URL may use a slightly different spelling or a different domain (e.g., .com versus .net).
  • If you are unsure whether an email, text message, mailed letter, or phone request is legitimate, try to verify the identity of the sender before taking any action. Do so by contacting the individual or company using verified information from previous correspondence or another trusted source rather than via information included in the suspicious communication.

Secure your home office

Working from home can be challenging. Just as your company is a target for cyber attackers, so are you 鈥 your personal information, personal accounts, and even your personal devices. Plus, you may not have all the security resources at home that are available at the office.

Here are some simple, effective tips you can follow to create a cyber-secure home:

  • Don鈥檛 default. Your connected home likely includes a wireless network, or Wi-Fi, that allows you to connect devices to the internet. Securing your home office starts here. Your Wi-Fi access point controls your wireless network and most likely came with a default administrator username and password. Once your access point is configured, be sure to change the password and, if possible, the default username as well. Next, change the default name of your wireless network, or service set identifier (SSID), ideally selecting a name unconnected to your address or family name.
  • Optimize encryption. Use the strongest encryption possible to configure your wireless network and avoid using older forms of encryption, such as wired equivalent privacy (WEP). If you are unsure of the type of encryption being used on your network, check the settings on your device and/or consult the manual for your wireless router. Again, don鈥檛 forget to choose a strong password or passphrase to access to your wireless network.
  • Secure all devices. Once your network is secure, it鈥檚 time to secure the devices connected to it. This can include not only your computer, but also smart TVs, gaming consoles, and 鈥渋nternet of things鈥 devices such as thermostats, doorbells, baby monitors, and even light fixtures. Once you have an inventory of connected devices, check that each has a strong, unique password. Some default passwords can be accessed through a simple internet search, so you鈥檒l want to complete the simple process of setting your own. Consider a password manager to help you keep track of passwords on all your personally owned devices.
  • Protect your conversations. You can鈥檛 be too careful with your home office. For those with 鈥渓istening鈥 devices in your homes 鈥 Alexa, Google Home, Siri, etc. 鈥 take extra care to protect sensitive conversations and conference calls from potential eavesdropping. Better safe than sorry.
  • Stay up to date. All software on internet-connected devices 鈥 PCs, smartphones, tablets etc. 鈥 should be kept up to date to reduce risk of infection from malware. And check with your internet service provider for potential help in protecting your home network.
  • Take the extra step. Always enable two-step verification for your online accounts whenever you can 鈥 it is one of the most effective steps you can take.
  • Keep your distance. Social distancing works online, too. Limit the amount of personal data you share on social media, share all data via online secure cloud applications, and avoid USB memory sticks in sharing data as they can spread malware.
  • Use common sense. In the end, you are your own 鈥 and your company鈥檚 鈥 best defense. So be aware, be vigilant, and be safe.

Cybercriminals prey on fear and confusion, but as with the COVID-19 pandemic itself, we can conquer this threat through knowledge and continuous preventive action. 


More Like This...

Meet the Authors & Experts

Bryant_Dean
Author
Dean C. Bryant
VP, Global Data Privacy Officer, Cyber Strategy

References

 

  1. https://www.sans.org/sites/default/files/2020-03/02-SSA-WorkingFromHome-FactSheet.pdf
  2. https://staysafeonline.org/press-release/ncsa-encourages-coronavirus-vigilance/
  3. https://cyberreadinessinstitute.org/remote-work-resources
  4. https://security.uri.edu/files/CreatingACyberSecureHome-Newsletter.pdf