Working From Home? Understanding Security Threats

By Samudra Vijay In Blog

13

Apr
2020
Work at Home -

How to Secure Your Cyberspace?
Talk or Email us, Subscribe to our ‘Know Your IT Series on Cybersecurity’.

Understand Cyberspace

  1. Cyberspace is essentially made up of three things – Hardware, Software and Networks.

  2. Securing Cyberspace means, securing Hardware, Software and Networks individually and collectively.

  3. In this Unit we take a closer look at threats to our cyberspace

Remember Cyberspace is an Enabler!

Thanks! To Cyberspace we can communicate, stay informed and entertain ourselves.

Some of us spend more time in Cyberspace than we should be!

Unfortunately, “bad guys” can enter our cyberspace; threaten us, and breach the security of our space.

Defending Your Territory

  1. Once you define your security perimeter, we can start examining the various threats based on how you use Cyberspace

  2. For example, if you are using Cyberspace for email communication, “bad guys” can use that channel to enter your cyberspace.

  3. When your browsing the Internet, the “bad guys” can lead you to a malicious website and collect “sensitive information” from you.

“bad guys” can use available channels to enter your cyberspace and breach its security. There are no rules in this game!

“bad guys” can exploit our weaknesses, ignorance or trick us into providing information that can be used to the breach the security of our cyberspace.

Defending cyberspace is a collaborative activity and requires the active participation of all users within a security perimeter.

Understanding Threats

  1. It is important to categorize the kind of threats we can face to manage our Cybersecurity defenses.

  2. It is easy to get overwhelmed and fall prey to simple attacks from the “bad guys”.

  3. Identifying threats to your cyberspace is called, Threat Modeling. Talk to us or email us on how to model threats to your cyberspace.

  4. Information available about existing threats is called, Threat intelligence

Use the ideas of threat modeling and threat intelligence to collect more information about threats

The three biggest threats when you are working from home are:

Examples of Threats and Defenses

  1. Threats to Software on your computer
    Malware – malware include computer virus and other rogue programs that make the computer unusable.

  2. Threat to your Business Operation
    Ransomware – “bad guys” take possession of your cyberspace and demand money to return it.

  3. Threat to your data and privacy
    Phishing – the “bad guys” collect sensitive information by laying a trap delivered as an email or through social media

Following a few simple steps, can improve your defenses manifold.

  1. For Malware
    Patch all Software and install an Antivirus on your computer
  2. For Ransomware
    Backup your critical data and have Disaster Recovery plan ready.
  3. For Phishing
    Be alert and cautious before opening emails, clicking links or responding in Social media

Look out! For Threat Indicators

The following are some threat indicators (you may need to investigate further before drawing any conclusions)
  1. While using your computer:​
  • Slow computer, unusual error messages​
  • Desktop has new icons and shortcuts that you did not create
  • Unwanted pop-ups and notifications​
  • Task manager shows programs not initiated by you (unknown services)​

2. While browsing the Internet:​

  • Annoying Ads and Pop-ups​
  • Browser hanging often​
  • The Address bar showing an unlocked sign​

3. While sending and receiving Emails​:

  • Email sent out without your express action (friends receive messages you never sent)​
  • Email received from malicious sender​
  • Email containing malicious links or attachments

Some Third Party Online Resources

Examples of Phishing - This webpage provides an overview of various attack vectors for email phishing. Takes about 10 minutes for a quick read.

Protecting Ourselves from Ransomware.

Frequently Asked Questions regarding safe browsing

Remember! You Can Stay Safe Online

Remember! You can stay safe online.

Securing Cyberspace is a 24/7/365 activity. Call or email us for support and education.

Subscribe to our Know Your IT Series on Cybersecurity –
Decide on the frequency of emails, use our online worksheets and other resources, free query clarification by email for subscribed members and subscription is free!
Request for services by

Leave a reply