Connect with us

Cyber ​​security

Is Your Work From Home Insecure? Follow these tips

Published

on

Is Your Work From Home Insecure? Follow these tips

Is Your Work From Home Insecure? Follow these tips

Is Your Work From Home Insecure? Follow these tips

There are many things to keep in mind for secure communication and cyber security while practicing work from home. A lot of resources are needed to make the working area safe.

The company needs to be able to determine how secure the corporate devices used remotely are. Some employees even use their own home devices to connect to the office.

In fact, a recent survey found that 50 percent of companies that allow work-from-home use their own equipment. At such times, many employees are unaware of the possibility of a cyber attack and its prior and emergency preparedness.

Covid 19 has conducted a study focusing on employees’ perceptions of the work from home that the world is practicing. The survey was conducted in the United Kingdom, the United States, Australia, France, Italy, Spain, Germany, Sweden, Russia, Mexico, Brazil, Colombia and Nepal.

How safe is work from home?

Six thousand 17 full time and part time employees participated in the survey. In the survey, 55 percent of employees said they had received the necessary devices for work from home.

Twenty-six percent of employees said there was no separate room available at home for work from home. Thirty-three percent of employees reported arguing with their children over Internet restrictions.

Similarly, 51 percent of employees admitted to viewing adult content on a device they use for work from home. Seventy-three percent of employees said they had not received any IT safety awareness training to start a work from home.

53 percent said they used VPN during work from home. Twenty-seven percent said they received malicious emails with COVID-19 as the headline.

Do it to stay safe

It is necessary to provide the right tools and information to the employees to avoid malicious malware and ransomware by maintaining cyber security during work from home. All employees working from home should ensure that they are working safely.

  1. In such a situation, in case of IT or security problem, to prepare in advance about whom to contact.
  2. Companies will arrange training for a certain period of time for the awareness of basic security for the employees. All these preparations and works can be done online. Such trainings can cover topics such as account and password management, email security, endpoint security and web browsing.
  3. Adopt data protection measures such as password protection, encrypting work devices and backing up data.
  4. Always keep the latest patches on devices, software, applications and services up to date. You can also do this by installing certified protection software such as Kaspersky Endpoint Security Cloud.
  5. Make sure you have access to the new threat intelligence and strengthen your protection solution.
  6. Double-check the protection available on mobile devices. For example, enable remote device location, data locking and wiping, screen locking, password and biometrics security features (security features like FaceID or TouchID).
  7. Companies should enable application control to ensure that employees are using only official applications.
  8. Ensure router support and make sure both the device and Wi-Fi are working properly while transmitting Wi-Fi to different devices.
  9. Keep your router constantly updated to prevent potential security issues.
  10. Set up a strong password for your router and Wi-Fi network.

And that is the end of the topic: Is Your Work From Home Insecure? Follow these tips

For more articles visit: www.afnotech.com

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Cyber ​​security

How strong or weak your password? Check it out like this

Published

on

How strong or weak your password? Check it out like this

How strong or weak is your password? Check it out like this

Of course, you may have many accounts online. You may have different passwords for Facebook, Twitter, Instagram, Mobile Wallet, Internet Banking, Gmail and other accounts.

You may think that the password in those accounts is very strong, which no one can hack. But have you ever checked, how strong are the passwords you use in your online account?

If you haven’t checked yet, today we are going to tell you about some of the tools that you can use to know how secure and strong your password is.

Generally, a length of 10 characters is considered sufficient for a strong password. However, one thing to keep in mind here is that the longer the password, the harder it is for the hacker to crack. So don’t be ashamed to have a 20 to 30 character password.

Another important thing is to change your password every three to four months, no matter how strong your password is.

Nordpass

Nord provides users with a free online password testing tool. With it, you can check if the password you have or are about to keep in your online accounts is strong.

As far as you know, if your password is strong, hackers will not be able to easily access your important and confidential data. It also allows you to create strong passwords.

It checks how strong any password is based on its length, uppercase-lowercase (uppercase and lowercase letters), symbols, numbers, etc.

It can even estimate how long a password can be cracked by a hacker. You do not need to download any software or apps to check your password strength here. You can check the password by visiting Nordpass’s website by clicking here. Click here if you want to create a strong password.

And that is the end of the topic: How strong or weak your password? Check it out like this

For more articles visit: www.afnotech.com

Continue Reading

Cyber ​​security

Cyber ​​attack on Fintech company from Python scripted Trojan malware

Published

on

Cyber ​​attack on Fintech company from Python scripted Trojan malware

Cyber ​​attack on Fintech company from Python scripted Trojan malware

A group that has been attacking Fintech’s web system has developed new Trojan malware and started targeting European countries. Advance Persistent Threat (APT), a group called EvilNum in 2018, has deployed new Python scripted Trojan malware to attack fintech companies.

The hackers deployed the malware to steal email addresses, passwords and other sensitive corporate information from Fintech. The malicious code for injecting malware is included in the code of the statutory application.

The group has been targeting fintech companies in the UK and Europe in particular.

He is also targeting some countries in the United States and Australia. Evilnum is considered a successful proven group for such activities. The group is said to be successful as it continues to change its attacking tools and techniques.

Evilnum’s activity is not always the same. He wrote JavaScript and C

Now he has deployed another new tool for attack. This time he has used Python Script Remote Access Trojan (RAT).

With the help of this Trojan malware, the attackers use ‘killing’ to steal important corporate information. Then take a screenshot of it. And collects all the information of the affected system.

Attackers can find out which Windows version of the computer is used, which antivirus product is installed and which USB devices are connected or not.

Earlier, the group used to attack targets with spare phishing emails.

Also read: Four types of malware you need to know (including avoidance tips)

And that is the end of the topic:Cyber ​​attack on Fintech company from Python scripted Trojan malware

For more articles visit: www.afnotech.com

Continue Reading

Cyber ​​security

‘Master Mind’ 17 year old teenager who shocked the world by hacking Twitter!

Published

on

'Master Mind' 17 year old teenager who shocked the world by hacking Twitter!

‘Master Mind’ 17 year old teenager who shocked the world by hacking Twitter!

U.S. prosecutors on Saturday charged three people with involvement in a recent Twitter hacking case. The timetable of the hack has also been made public in a court document issued by the Ministry of Justice.

The document also details how US investigators tracked down the suspected hackers. According to court documents, the entire hacking activity started on May 3.

A teenage clerk from Tampa, Florida (who had been living in California) gained access to a portion of Twitter’s network on May 3.

But what happened between May 3 and July 15 is still unclear. However, Clark initially failed to gain access to the Twitter admin tool used to kill the account from a section of the network.

But on the second day of the Twitter hack, according to a report in the New York Times, Clerk initially had access to Twitter’s internal slack workspace, not Twitter.

New York Times reporters quoted a hacker community source as saying that the hacker had found the login details of a Twitter tech support tool. From there, he broke into a slack channel of the company.

On the day of the hack, a picture of the tool, which controls all Twitter accounts, was leaked online by Twitter employees. However, the login details of the tool were not enough to access the back end of Twitter.

According to Twitter’s blog post, Twitter’s administrative back-end is protected by two-factor authentication. How long it took the clerk to do all this work is still unclear.

But according to Twitter researchers, the hacker used a “phone spare phishing attack” to trick Twitter employees into accessing their accounts and break two-factor authentication.

All of this happened on July 15. It was the same day that the company that hacked Twitter made it public.

Immediately after that Kirk

OG Users Discard Channel is a special forum where hackers buy and sell social media accounts. Clerk Rolex through that channel

And that is the end of the topic: ‘Master Mind’ 17 year old teenager who shocked the world by hacking Twitter!

For more articles visit: www.afnotech.com

Continue Reading

Title

How strong or weak your password? Check it out like this How strong or weak your password? Check it out like this
Cyber ​​security2 months ago

How strong or weak your password? Check it out like this

How strong or weak is your password? Check it out like this Of course, you may have many accounts online....

Cyber ​​attack on Fintech company from Python scripted Trojan malware Cyber ​​attack on Fintech company from Python scripted Trojan malware
Cyber ​​security2 months ago

Cyber ​​attack on Fintech company from Python scripted Trojan malware

Cyber ​​attack on Fintech company from Python scripted Trojan malware A group that has been attacking Fintech’s web system has...

Apple event to be held on September 15, iPhone Twelve? Apple event to be held on September 15, iPhone Twelve?
Technology2 months ago

Apple event to be held on September 15, iPhone Twelve?

Apple event to be held on September 15, iPhone Twelve? Amidst many rumors, Apple’s next big event is scheduled to...

Facebook's controversial gaming app has been released in the App Store Facebook's controversial gaming app has been released in the App Store
Social media2 months ago

Facebook’s controversial gaming app has been released in the App Store

Facebook’s controversial gaming app has been released in the App Store Facebook has removed its special gaming app Facebook gaming...

MI Ten T Pro with 108 megapixel camera, along with 8 GB RAM MI Ten T Pro with 108 megapixel camera, along with 8 GB RAM
Gadgets2 months ago

MI Ten T Pro with 108 megapixel camera, along with 8 GB RAM

MI Ten T Pro with 108 megapixel camera, along with 8 GB RAM Xiaomi is launching MI Ten T and...

Telecom and Internet services in the epidemic: a disaster & an opportunity Telecom and Internet services in the epidemic: a disaster & an opportunity
Internet2 months ago

Telecom and Internet services in the epidemic: a disaster & an opportunity

Telecom and Internet services in the epidemic: a disaster & an opportunity The Internet and the telecommunications sector are always...

Nepal's mobile data is 10 times more expensive than India's Nepal's mobile data is 10 times more expensive than India's
Telecom2 months ago

Nepal’s mobile data is 10 times more expensive than India’s

Nepal’s mobile data is 10 times more expensive than India’s While users in neighboring India are using the world’s cheapest...

A 21-year-old Nepali youth discovered Instagram's 'bug' and won a हजार 6,000 prize A 21-year-old Nepali youth discovered Instagram's 'bug' and won a हजार 6,000 prize
Social media2 months ago

A 21-year-old Nepali youth discovered Instagram’s ‘bug’ and won a हजार 6,000 prize

A 21-year-old Nepali youth discovered Instagram’s ‘bug’ and won a हजार 6,000 prize Cyber ​​security researcher Saugat Pokharel has discovered...

Rolling Nexus, a social networking site that provides employment opportunities Rolling Nexus, a social networking site that provides employment opportunities
Technology2 months ago

Rolling Nexus, a social networking site that provides employment opportunities

Rolling Nexus, a social networking site that provides employment opportunities Rolling Nexus.com, Nepal’s first commercial social network, has officially launched....

'Master Mind' 17 year old teenager who shocked the world by hacking Twitter! 'Master Mind' 17 year old teenager who shocked the world by hacking Twitter!
Cyber ​​security2 months ago

‘Master Mind’ 17 year old teenager who shocked the world by hacking Twitter!

‘Master Mind’ 17 year old teenager who shocked the world by hacking Twitter! U.S. prosecutors on Saturday charged three people...

Trending