Home Network Security Archives - Les Olson IT https://lesolson.redpeppersoftware.net/blog/tag/home-network-security/ Your Office Technology Partner Thu, 24 Sep 2020 14:42:09 +0000 en-US hourly 1 https://wordpress.org/?v=6.1.6 https://lesolson.redpeppersoftware.net/wp-content/uploads/2021/11/cropped-LO_ITfavicon-1-1-32x32.png Home Network Security Archives - Les Olson IT https://lesolson.redpeppersoftware.net/blog/tag/home-network-security/ 32 32 3 Tips to Secure Users Working from Home https://lesolson.redpeppersoftware.net/blog/3-tips-to-secure-users-working-from-home/ Mon, 30 Mar 2020 13:52:55 +0000 https://lesolson.com/?p=12983 Many businesses are prioritizing the health and safety of their employees, allowing them to work remotely. While this is a great move, given current circumstances, it's important to also look out for the health of your network during this time. Here are our top 3 tips to secure users working from home.

The post 3 Tips to Secure Users Working from Home appeared first on Les Olson IT.

]]>
[cz_image id=”cz_109413″ image=”12986″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_86584″ cz_title=””]Many businesses are prioritizing the health and safety of their employees, allowing them to work remotely. While this is a great move, given current circumstances, it’s important to also look out for the health of your network during this time. Here are our top 3 tips to secure users working from home.

 

#1 Make Sure Your Devices and Systems are Fully Protected

Now is not the time to click “Remind me Later” on your operating system update. It’s more important than ever to ensure that all your network-connected devices, operating systems, and software applications are up-to-date with the latest versions and security patches.

 

Hackers can and will take advantage of an organization’s lax defenses, looking for whatever crack in security they can exploit. Make sure your IT Administrator stays on top of things on their end, and that employees know they’re expected to perform updates when prompted, rather than pushing it off for another time.

 

#2 Create a Secure Connection Back at the Office

We have 3 words for you. Virtual Private Network, otherwise known as VPN. While employees are at home getting work done, there will be a lot of information traveling back and forth between them and the office. We’re willing to bet you want to keep that information private and protected.

 

A VPN ensures the data being sent back and forth is encrypted, and it can also give your employees secure access to the files on your network needed to complete their jobs.

 

#3 Scan and Secure Emails, While Establishing Good Email Practices

Keeping lines of communication open while everyone works from a different physical location is important, so it comes as no surprise that the number of emails being sent will increase. With a cluttered inbox, it might be harder than usual to spot those sly phishing emails, designed to trick you. It’s not pretty, but scammers and hackers are hard at work blasting workers with phishing emails related to Coronavirus. Be sure to educate everyone on your team about phishing and how they can avoid getting caught up in a scam.

 

While educating employees about scams is your best line of defense, IT Administrators should take extra precautions to ensure email protections are up-to-date…just in case an employee accidentally clicks something they should’t.

 

We know there is a lot to think about right now, but these 3 tips to secure users working from home is a great step you can take to protect your business from the added hardship of a security breach.[/cz_title][cz_gap height=”60px”]

[cz_gap height=”60px”][cz_title id=”cz_59451″]

Get a Network Security Consultation

[/cz_title][cz_gap height=”35px”]

[cz_gap][cz_title id=”cz_76443″]

Download Our Infographic

[/cz_title][cz_image link_type=”custom” id=”cz_83866″ image=”12988″ link=”url:http%3A%2F%2Flesolson.com%2Fwp-content%2Fuploads%2F2020%2F03%2FSecure-Users-Working-from-Home-Infographic.pdf|||”][/cz_image]

The post 3 Tips to Secure Users Working from Home appeared first on Les Olson IT.

]]>
National Cybersecurity Awareness Month: Make Your Home a Haven for Online Security https://lesolson.redpeppersoftware.net/blog/national-cybersecurity-awareness-month-make-your-home-a-haven-for-online-security/ Tue, 02 Oct 2018 17:14:40 +0000 https://lesolson.com/?p=6167 Our homes are our safe havens. None of us want to think that a stranger could access our most personal space and leverage our most personal information, but it happens all the time through our computers and other internet-connected devices.

The post National Cybersecurity Awareness Month: Make Your Home a Haven for Online Security appeared first on Les Olson IT.

]]>
[cz_image id=”cz_49000″ image=”6169″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_79281″ cz_title=”” sk_overall=”line-height:0;”]

It’s National Cybersecurity Awareness Month. Each week we’ll be exploring a different topic for staying safe online. This week we’re taking a deep dive into protecting your home from cyber threats.

[/cz_title][cz_gap height=”25px”]

Our homes are our safe havens. None of us want to think that a stranger could access our most personal space and leverage our most personal information, but it happens all the time through our computers and other internet-connected devices. Your personal computer is where you store your most precious files, family photos, important documents, private information. Taking precautions to stay safe online will ensure that your personal files aren’t exploited by cybercriminals. The home is also where our kids are accessing the internet, bringing a whole other level of potential threats. In this article we’ll cover a variety of ways you can make your home a haven for online security.

Avoiding Phishing Attacks

Phishing attacks have become so common in the workplace and at home. For many cybercriminals, this is the preferred method for gaining access to your personal information and installing ransomware and malware. The good news is, you can learn to spot these attempts and avoid them all together. First of all, it’s important to recognize that anyone can fall for these attacks, no matter how intelligent. Yes, there are some obvious attacks, but many are sophisticated, using psychology to trick you into performing their desired task. Phishing attacks generally come in the form of an email or phone call. You may be asked to click on a link, or provide personal information. Here are some tips for spotting and avoiding phishing attacks:

  1. Be skeptical about unsolicited phone calls and emails, even if they appear to be from a legitimate organization. An organization such as your bank, or your doctor’s office will NOT contact YOU asking for personal information. This is information they should already have. When in doubt call the organization at their official phone number to inquire whether they actually need information from you.
  2. Pay close attention to the urls and email addresses in the emails sent to you. If there is any hyperlinked text, hover over it with your mouse to see where exactly that link would take you before clicking it. Many times hackers will make an email address or web address that looks just close enough to the real thing to trick you. It may have a slight misspelling, or even take you to a slightly different address like one ending in .biz, for example. Simply clicking on a bad link could install ransomware on your computer. You and everyone in your home should click with caution.
  3. Take advantage of antivirus software to secure your home computers.

Talk to Your Kids About Internet Safety

Kids today are introduced to the internet earlier than ever and are more immersed in the online world than many parents realize. Keeping your kids safe on the internet is an important and difficult task. There are so many things to protect your kids from, and the best way to protect them is to make sure they know what to look out for. Start talking to them about internet safety early, and continue to re-enforce the importance of staying safe online throughout their lives. Kids will inevitably run into things they shouldn’t online, so teach them to spot and avoid inappropriate:

  1. Conduct: Whether it’s their conduct, or the conduct of others, kids need to understand that certain online behaviors are not acceptable – especially bullying. They also need to be aware that what they post online never goes away and can follow them throughout their lives.
  2. Content: There is no shortage of inappropriate content on the internet for your kids to find. Talk to your kids about avoiding explicit images, videos, hate speech and violence.
  3. Contact: Kids should be wary of being contacted by strangers, even if they appear to be a pier. It’s important that they understand not everyone online is who they say they are and could be predators, hackers, scammers or bullies.

The FBI offers great, age-appropriate educational games and training for kids through their Safe Online Surfing series.

Staying Safe on Social Media

Chances are everyone in the family has at least one social media account. Here are some tips for being a savvy social media user to protect yourself and your profile.
Be careful what you share. For example, maybe wait until you get back from your vacation to post those pics. Speaking of photos, share only what you want everyone to see – it can stay on the internet for a lifetime and beyond. Don’t share your location and never post private information. The more you share about yourself online, the more you open yourself up to scams and identity theft.

  1. Be cautious when clicking links. Clicking the wrong link can get your account hacked or open up your computer to viruses, ransomware and malware. Even if you get a private message from a friend, think hard about whether it makes sense that this person would be sending you a random link.
  2. Password protect your phone and tablets if you plan to have social media apps installed.
  3. Utilize antivirus software on your computer.
  4. Be aware of the privacy policies on the various social media sites you use. Make sure you understand how your information will be used, and what will be shared by default. It’s always a good idea to customize your privacy settings so your posts and profile are only visible to the people you want them to be.
  5. You don’t have to accept every friend request. If it’s from a stranger, or someone with no mutual friends, just pass.
  6. Create a strong password. Strong passwords will include a mix of numbers, uppercase and lowercase letters and special characters. You should also be sure to avoid using full words in your passwords as this can make you vulnerable to brute force attacks. Check out our article – 8 Tips for a Stronger Password.

Cybersecurity & the Internet of Things

People often overlook just how many devices in their homes are connected to the internet, and therefore vulnerable to attack. Technology has taken over the home. Security cameras, garage door openers, routers, streaming devices, sprinkler systems, printers, even some refrigerators. Our homes run off of an internet connection. It’s very convenient…for you and the hackers. Chances are your home is filled with “smart devices” that communicate with the internet, sending and receiving data. Avoid allowing bad actors access to your devices by doing the following:

  1. Regularly reboot devices. Most malware is stored on memory, meaning it will be removed upon reboot.
  2. Use antivirus software.
  3. Change default usernames and passwords.
  4. Always install all available updates and patches.

If you’re concerned your devices may be compromised, be sure to submit an Internet Crime Complaint to the FBI. If you’re looking for a good tool to help secure your home computers, check out Sophos Home. It’s a free, business-grade cybersecurity software for home computers. We highly recommend it.

The post National Cybersecurity Awareness Month: Make Your Home a Haven for Online Security appeared first on Les Olson IT.

]]>
How to Secure Your Home Computer for FREE https://lesolson.redpeppersoftware.net/blog/how-to-secure-your-home-computer-for-free/ Wed, 24 May 2017 19:03:40 +0000 https://lesolson.com/?p=11112 With a slew of high-profile ransomware attacks and the increasing number of ways your computer can be breached, you’re probably wondering what you can do to protect your home computer.

The post How to Secure Your Home Computer for FREE appeared first on Les Olson IT.

]]>
[cz_image id=”cz_37728″ image=”11548″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_58468″ cz_title=””]With a slew of high-profile ransomware attacks and the increasing number of ways your computer can be breached, you’re probably wondering what you can do to protect your home computer.

 

After all, it’s where you store your most precious data. Family photos, tax documents, home videos, music. What would you do if it all suddenly vanished while a hacker waited for you to find a way to pay their ransom in Bitcoin? And what if you couldn’t come up with the money? They’ll delete your files without a second thought.

 

Businesses everywhere understand the importance of securing their computers and networks, but home computers are often overlooked when it comes to security risks. Possibly because of cost, possibly because of the overwhelming number of programs available, some of which can slow your computer down to the point of paralysis. Whatever your reason for not securing your home computer, Sophos Home is worth some serious consideration. The best part, it’s FREE.

 

Sophos has announced that they are offering their Sophos Home computer security software to anyone who wants it for personal use, for absolutely nothing. So what’s the catch? Annoying ads? Nope. Just business-grade security, from a leading provider, in your home.

 

This software protects all the computers in your home, whether you’re a Mac or PC fan. Using this software you can protect your computers from malware, viruses, ransomware, and prevent young users from visiting inappropriate websites. When compared with other popular alternatives, Sophos Home proves to be the most robust option.

 

Security Made Easy

Going far beyond simply preventing malware, Sophos Home removes malware, viruses, ransomware, and malicious apps and programs. Using SophosLab’s Real-time Threat Intelligence, Sophos Home is a more proactive way to protect your computers at home.

 

Installation Isn’t Rocket Science

Installation and management are fast and user-friendly. Easily manage and secure computers; ad-free.

 

Block Unwanted Content

Unlike Sophos Home, many home computer security solutions don’t offer the tools you need to identify and block inappropriate content, which is why this software is the ideal option for families. Questionable websites aren’t the only thing it blocks. Phishing attacks, malware, viruses, and illegitimate websites are also analyzed and automatically blocked.

 

See How It Works:

[/cz_title]

[cz_title id=”cz_87917″ cz_title=””]Too good to be true? Nope, just really good software to help you protect your computer at home. Seriously.

Users who are looking for even more robust security can try Sophos Home Premium, free for one year. With Sophos Home Premium you gain access to some of the most advanced home computer security features available when you sign up for their BETA program. Sophos Home utilizes advanced security technology, commercial-grade ransomware protection, upgraded privacy to prevent unauthorized access to your webcams, keyboards, browsers, etc., and wipes malware clean from your system.[/cz_title]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_58742″ sk_overall=”background-repeat:no-repeat;background-position:right bottom;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/10/artArtboard-1encryptionimplementationguide.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”url:%2Finfo%2Fencryption-implementation-guide%2F|||”][cz_title id=”cz_97854″ link=”url:%2Finfo%2Fencryption-implementation-guide%2F|||” sk_overall=”background-color:rgba(255,255,255,0.84);left:-16px;”]

ENCRYPTION

IMPLEMENTATION

GUIDE

[/cz_title][cz_gap height=”30px” id=”cz_62034″][cz_social_icons fx=”cz_social_fx_10″ id=”cz_81764″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Watch%22%2C%22link%22%3A%22%2Finfo%2Fencryption-implementation-guide%2F%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_13803″ sk_overall=”background-repeat:no-repeat;background-position:left bottom;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/10/artArtboard-1deeplearning.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-right:50px;padding-bottom:35px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”url:%2Finfo%2Fhow-intercept-x-uses-deep-learning%2F|||”][cz_title title_pos=”cz_title_pos_right” id=”cz_42534″ link=”url:%2Finfo%2Fhow-intercept-x-uses-deep-learning%2F|||” sk_overall=”background-color:rgba(255,255,255,0.83);”]

DEEP LEARNING

ENHANCES

ENDPOINT SECURITY

ARTICLE

[/cz_title][cz_social_icons position=”tar” fx=”cz_social_fx_10″ id=”cz_60704″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Download%22%2C%22link%22%3A%22%2Finfo%2Fhow-intercept-x-uses-deep-learning%2F%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]

The post How to Secure Your Home Computer for FREE appeared first on Les Olson IT.

]]>