News

3/26/2018
01:00 PM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail
100%
0%

8 Security Spring Cleaning Tips for the Home Office

Use these ideas to sharpen up your home office machine against potential intruders.
Previous
1 of 9
Next

(Image Source: Shutterstock via Prostock-studio)

(Image Source: Shutterstock via Prostock-studio)

Officially, it became spring early last week, although people in the snowbound Northeast are anxiously awaiting the arrival of the actual spring weather that brings flowers, green grass, and baseball season.

So wherever you live, if you run and manage a home office, now’s a good a time to do some spring cleaning so your devices are less vulnerable to malware and potential threats. While this may seem to affect only a small percentage of workers, it’s really not the case anymore. A Gallup survey from last year found that 43% of employed Americans work from home at least some of the time.

T. Frank Downs, director of SME cybersecurity practices at ISACA, says home workers have to conduct themselves just as they would in the office.

"People have to be aware of their surroundings and operate the same way, being sure not to open up suspicious emails, weird attachments or install thumb drives that might come in the mail," Downs says.

Russell Schrader, executive director of the National Cyber Security Alliance, adds that cleaning your machine is one thing - keeping it clean is yet another task.

"Once you get your machine clean you'll want to keep it clean," Schrader says. "It's really important to keep on it, always asking if you really want to share that document or download the latest cool application you saw. The idea is to be mindful of security and build habits that will make it easier for you to keep it clean. It's like your house, once you clean it well one time it's easier to keep it clean moving forward."

The eight tips in the slideshow are based on interviews with ISACA's Downs and NCSA's Schrader. They offer some practical advice on how to keep applications up-to-date, how to handle public hotspots and keep your home router up-to-date. 

 

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Previous
1 of 9
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Arthur Heath
50%
50%
Arthur Heath,
User Rank: Apprentice
3/29/2018 | 6:22:30 PM
Great Article! Using a VPN is a great reminder
Great security tips! Leveraging VPNs is definitely a great way to protect one's data. I found another article that details the different security protocols VPNs use:

IP Security

Layer 2 Tunneling Protocol

Point-to-Point Tunneling Protocol

Secure Sockets Layer

Secure Shell

https://gizmodo.com/5990192/vpns-what-they-do-how-they-work-and-why-youre-dumb-for-not-using-one

 
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Insider Threat Prevention activated!
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7238
PUBLISHED: 2019-03-21
Sonatype Nexus Repository Manager before 3.15.0 has Incorrect Access Control.
CVE-2017-16253
PUBLISHED: 2019-03-21
An exploitable buffer overflow vulnerability exists in the PubNub message handler Insteon Hub 2245-222 - Firmware version 1012 for the cc channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriti...
CVE-2017-16254
PUBLISHED: 2019-03-21
An exploitable buffer overflow vulnerability exists in the PubNub message handler Insteon Hub 2245-222 - Firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can send an authenticated HTTP re...
CVE-2017-16255
PUBLISHED: 2019-03-21
An exploitable buffer overflow vulnerability exists in the PubNub message handler Insteon Hub 2245-222 - Firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can send an authenticated HTTP re...
CVE-2018-3968
PUBLISHED: 2019-03-21
An exploitable vulnerability exists in the verified boot protection of the Das U-Boot from version 2013.07-rc1 to 2014.07-rc2. The affected versions lack proper FIT signature enforcement, which allows an attacker to bypass U-Boot's verified boot and execute an unsigned kernel, embedded in a legacy i...