Securing Your Digital Cyberspace at Home

Securing Your Digital Cyberspace at Home

Nov 24, 2021 | Data & Cybersecurity

Securing Your Digital Cyberspace at Home 1

Cybercrime has become a sophisticated and global business operation. Cybercriminals are no longer targeting businesses alone, instead, they are shifting their focus to anyone with a potential financial gain.

A weak security system means that you are more susceptible to hacking. The level of effort to hack is easier for cybercriminals if they are attacking an average consumer versus a business that may have a multitude of protections in place. Although they are hacking average consumers they can still walk away with a huge amount of money.

Every piece of technology you own is connected. This connection surpasses laptops and phones – consider all the devices that are intertwined in your network such as printers, remote controls, headphones, home alarm systems, smart home devices, thermostats, baby monitors, cars, etc. Each of these devices is a potential entry point into your network.

Our professional and personal life are blended. For example, you may use a laptop for the sole purpose of work but use your own personal phone to check emails when you are away from your desk. Your laptop may be secure, but your personal phone may not be and that is an entry point for hackers.

Aside from device security network security is at stake too. When you are at home you are also sharing your network with other people within the household and that too poses a threat.

 

Common Threats Online:

1. Phishing
  • The intent of phishing is to get users to take action such as: clicking a link, opening a file, or downloading files. Ultimately the goal of phishing is to try to gain access to personal information like your login credentials or for you to download malware onto your device.
  • Phishing is all about impersonation, such as pretending to be a brand that you trust or a person you know.
  • Apart from emails phishing can come in different forms such as text messages, apps, and social media.

 

2. Malware
  • Any malicious program or code to spy, infiltrate your data, ransoming your data, capture keystrokes, or steal your login credentials (often works concurrently with phishing.)
  • Malware can come from a variety of different places. It can hide in links, files, images, websites, or ads.

 

3. IoT Vulnerabilities
  • These are smart home devices such as home security systems, thermostats, or baby monitors.
  • Hackers could use these devices as a foothold on your broader home network to pivot to other devices.

 

3 Ways to Stay Safe Online:

1. Protect Your Accounts
  • Turn on multi-factor authentication for your emails, bank accounts, social media, and iCloud.

 

2. Protect Your Devices
  • Keep software updated and turn on built in security.
  • Almost all software updates include a security patch for known vulnerabilities.
  • Update your operating system as well as any apps or software installed onto your device.
  • Make backups of your data.

 

3. Protect Your Network
  • Use a network firewall with advanced threat blocking.
  • Antivirus alone is not enough, stop the threats before they reach your devices.

 

Conclusion

Acts of prevention go a long way. By incorporating the steps above into your daily life, you are making your home and devices more secure from a cyber threat.

 

Additional information on cybersecurity:

Vivian Nguyen

Vivian Nguyen started her career working in the insurance industry assessing risks for property and casualty.

With a BA in Journalism and Marketing, Vivian now supports Shared Assessments’ marketing team with content creation and coordination. 

Vivian is from Los Angeles and enjoys traveling, indulging in pasta, and spending time with family and friends. She is also a social media influencer in the gaming community.

Connect with Vivian via email or through LinkedIn.


Sign up for our Newsletter

Learn about upcoming events, special offers from our partners and more.

Sub Topics