Monday, April 12, 2021
TechMoran
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition
  • Classifieds
No Result
View All Result
TechMoran
">
Home Cybersecurity

Four Cybersecurity Considerations When Working from Home

Jacob Mugendi by Jacob Mugendi
11 months ago
in Cybersecurity
6 min read
0

For many people, working from home can be fun but also scary when you consider you have neither the usual technical support that is offered in the office, nor covered by the security protocols that exist in offices. This calls for one to proactively take initiative to stay safe and protect themselves from cyber-attacks.

When it comes to cybersecurity, it is hard to identify all the loopholes that could expose you. The most important thing is to ensure that you follow the best practices and seal all loopholes possible. Her are a few things to consider.

Software Update

All good software is alive, and it keeps changing every day in response to dealing with new threats or adding new features. This is why it is important to keep your software up to date as the first step to staying safe.

Set up regular updates and if not possible, do the updates manually. You can set this to install during off peak hours so that it will not interrupt your work, but ensure you do not snooze indefinitely.

Strong Passwords

Using a strong password is the most basic way to stay safe and prevent unauthorized access to your accounts. How do you make a strong password?

  • Make the password long enough, at least ten characters.
  • Avoid easy to guess words or phrases.
  • Use a combination of small letters, caps, special characters and numbers.
  • Get a password manager if it is getting hard to keep up with the passwords.

Two-factor Authentication

A password is a good thing, but it is only good if someone else does not have it. One way to ensure that you are safe even if someone has access to your password is to use Two-factor Authentication.

READ  CISOs and Cybersecurity experts to assess the continent’s Cybersecurity landscape

A Two-factor Authentication involves using two things that you physically have to enhance security in addition. In addition to a password, you could require a code to be sent to you via SMS or an authentication app. It could also be a fingerprint or a saved token.

Related posts

Sophos shows how a five-day Conti ransomware attack unfolds day-by-day 

February 18, 2021
0

Learn Data Privacy, Data Protection Measures & Privacy Laws

December 6, 2020
0
Computer privacy attack. Mixed media

Cybersecurity Attacks Increase As Kenyans Ignore The New Data Protection Act

November 30, 2020
0

Beware of North Korean Hackers, US Warns

November 5, 2020
0

Seculetter partners with SA’s Afri-ko as a product supplier

September 14, 2020
0

How to Protect Mobile Applications?

September 7, 2020
0

This ensures that whoever hacks your password will not successfully manage to log into your platforms unless they can also get access to the second factor, thus making it harder for attackers.

Secure Wi-Fi

The Wi-Fi forms a major gateway where we can connect to the rest of the world. Your home router needs to be secured in a similar way that you secure your house from the outside world. Here is what you can do:

  • Always have a password for your WiFi network.
  • Ensure that the router is not using the default email and password.
  • Avoid public WiFi networks. You can never be sure who is listening sniffing the information passing through the network.
  • If you are using a router that you bought in 1999, it is time to replace it. This way you will benefit from newer technologies and features meant to make you more secure.
READ  Cybersecurity Attacks Increase As Kenyans Ignore The New Data Protection Act

Conclusion

As you may have noted, the considerations above are neither exhaustive and nor are they only meant for working from home. These are basic step for cyber hygiene whether you are working from home or from the office. With these in place, you will be protected from most common cyber attacks that target people online.

Readers 2,184

Share

  • Click to share on Telegram (Opens in new window)
  • More
  • Click to share on Tumblr (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pocket (Opens in new window)

Like this:

Like Loading...

Related

Tags: Cyber securitypasswordpublic wifi
Jacob Mugendi

Jacob Mugendi

Related Posts

Cybersecurity

Sophos shows how a five-day Conti ransomware attack unfolds day-by-day 

February 18, 2021
0
Cybersecurity

Learn Data Privacy, Data Protection Measures & Privacy Laws

December 6, 2020
0
Computer privacy attack. Mixed media
Cybersecurity

Cybersecurity Attacks Increase As Kenyans Ignore The New Data Protection Act

November 30, 2020
0
Columnists

Beware of North Korean Hackers, US Warns

November 5, 2020
0
Cybersecurity

Seculetter partners with SA’s Afri-ko as a product supplier

September 14, 2020
0
Cybersecurity

How to Protect Mobile Applications?

September 7, 2020
0
Cybersecurity

CISOs and Cybersecurity experts to assess the continent’s Cybersecurity landscape

August 26, 2020
0
Cybersecurity

How to secure your business from Cyber Attacks

July 30, 2020
0
Cybersecurity

How to Avoid Being a Victim of Online Fraud

July 16, 2020
0

ADVERTISEMENT

Join our Mailing List

Loading

Recent Posts

OPPO Reno5 F Impressions: Compelling!

April 11, 2021

OPPO Reno5 Review: Easy To Love

April 11, 2021

CBD Softgels – Are They Beneficial?

April 10, 2021
X10

Nokia unveils Nokia X20, Nokia X10, Nokia G20, Nokia G10, Nokia C20 & Nokia C10

April 9, 2021

Ampersand raises $3.5m to rapidly scale its electric motorcycle & swap station network in Rwanda

April 9, 2021
">
">

Follow Us

">

There are many sites out there focused on blowing off some steam, from funny entertainment to thrilling experiences like playing online, in some cases online gaming could grant you the chance to win extra money. We came across rocketpot.io while browsing for a good btc casino online and it left us a very good impression with their wide variety of games and crypto offering.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© 2019 Moran Media Group - All rights reserved TechMoran.

No Result
View All Result
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition
  • Classifieds

© 2019 Moran Media Group - All rights reserved TechMoran.

Login to your account below

Forgotten Password? Sign Up

Fill the forms bellow to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
%d bloggers like this: