Cyber Security Doesn't Stop at Work, and Neither do the Criminals!
The Issue
From banking to shopping, gaming, and streaming to social media and working from home, our family are spending more time than ever online. This includes our children and extended families. Therefore, this increases the attack surface against our households. In plain language this means that there are more opportunities for hackers to carry out cyber-attacks against our families and friends.
![](https://static.wixstatic.com/media/52389c_a7befb7c074744a6b58bfee819dcdead~mv2.jpg/v1/fill/w_768,h_401,al_c,q_80,enc_auto/52389c_a7befb7c074744a6b58bfee819dcdead~mv2.jpg)
The most common attack vectors which are currently being used by malicious threat actors are by using:
Email and Website Scams – These engage users into providing credentials or providing cardholder data into either compromised sites, or diverting the user to a malicious site, designed to capture credentials and personal information.
Malware - software that can damage your device or let a hacker into your home network will allow an attacker to be able to monitor and gain information.
Incorrect Configurations – Weak, or misconfigured network appliances can allow attackers to ‘walk’ into your home networks and collect information.
The ‘What If’
If hackers get into your devices, accounts, or home networks they could access your money, your personal information, or information about your family life or business.
Just imaging what would happen if all of your devices at home were attacked by Ransomware!
Would you know what to do? Who would you turn to? Most importantly, how could you get Minecraft and Roblox working for the children!!
The Solution – Part One
You can calm down, it hasn't happened to you yet and we need to keep it that way! So where are the quick wins to getting your home secured?
There are ways that you can improve your cyber security by taking six quick actions, as presented as part of the National Cyber Security Centre’s ‘Cyber Aware’ campaign. These actions are as follows:
1. Use a strong and separate password for your email
2. Create strong passwords using 3 random words
3. Save your passwords in your browser
4. Turn on two-factor authentication (2FA)
5. Update your devices
6. Back up your data
The Solution – Part Two
Although these 6 Cyber Aware recommendations are a good start, they will not be able to uncover activity being undertaken upon devices or identify if there are vulnerable devices being presented within your home network.
To complement the Cyber Aware recommendations, having a threat intelligence platform, designed to identify and protect against malicious activity within your home and business networks will provide a massive increase in forward intelligence, allowing us to be able to secure our home networks.
![home network devices being secured](https://static.wixstatic.com/media/52389c_55acc9a2881f4df6bcd1629a7c98fbef~mv2.png/v1/fill/w_902,h_440,al_c,q_90,enc_auto/52389c_55acc9a2881f4df6bcd1629a7c98fbef~mv2.png)
Our consultation services will also allow you to understand how to better use your network, isolating wireless networks to their own security domains, keeping the children away from corporate devices (for the WFH community) and reducing your potential of attack.
The Benefit
By employing the Cyber Shield, the following benefits will be realised from day one, allowing for a speedy installation, interrogation, investigation and isolation of any malicious activity being identified upon our home networks:
Our range of services within the Forint Shield Solution cover the Internal Security and Network Assessments, Cloud Assessments, Vulnerability Scanning and our flagship product the 24/7 Monitoring Solution, which will provide your network with a SOC2 compliant level of monitoring of corporate devices.
Our rapid onboarding process will progress through the preparation phase of the Incident Response cycle, increasing your security score, identifying vulnerabilities, and reducing the attack surface of your home. You will then be ready to react to potential threats and react effectively when any malicious activity is identified. This, aligned with industry leading threat hunting applications and integration into current technologies in place makes our solution a game-changer.
For more information and an initial FREE trial of our SOC solution or discuss the options open to you, then please contact us directly and we can work on the reduction to the potential of attack against your company.
Comments