Tips For Working From Home Here are some tips to promote safe remote working, All of these are equally important. 1. Make sure you understand best practices. Now more than ever it?s important for you to stay up to date on cybersecurity. If your organization has an ongoing training program, make sure you?re actively participating. Scams like phishing only INCREASE when employees are working remotely ? you must stay in the know on current threats and best practices. 2. Make sure you understand your organization?s policies and procedures. If you?re working remotely, your organization should have a Remote Work Policy. Make sure you have read and understood that policy and what is expected of you. You should also continue following ALL company policies and procedures as if you were in the office. 3. Don?t use public Wi-Fi for work. Work should be done from a secured network, preferably in a home environment and with company equipment. It is also highly recommended that you connect to your company?s network with a Virtual Private Network (VPN). If you are unsure of how to do that, contact your supervisor or IT for more information. 4. Keep all software up to date. Updates/patches are often released to address security flaws and other loopholes or risk factors. Keeping all devices updated is critical in preventing unauthorized access. 5. If possible, use only company-issued devices for work. Do not let friends or family members use your company-issued device. 6. Do not use your company-issued device for personal use. It is advised to stay off social media, shopping sites, or any other websites you may visit in your free time when using a company-issued device. Only do secure, company work on company devices and time. 7. Be mindful of where you save files and data. Do not save files on your local or personal hard drives that may be more likely to be breached. 8. Back up your files. If you?re unsure of your company?s backup procedure, contact your supervisor or IT. It is very important to back up your work that way if a local loss occurs, data can be more easily recovered. 9. Use strong, unique passwords. Make sure your passwords for your device and all of your accounts are strong and unique. Never reuse the same password across multiple accounts, and do not share your passwords with others. 10. Lock screens when not in use. This helps limit any unauthorized access to the information you may still have open on your system.
Let?s review some of these factors. Personally-Owned Technology Just as in the workplace itself, personal devices are a major risk factor when an employee is working from home. Consider the activities that are typically done on a workstation, as compared to those that are typically done on the personal computer. They are very different. While a workstation generally requires access to a relatively limited number of resources, websites, and programs, a lot more is comparatively done on a personal device. Online shopping, casual browsing, and social networking are far more common, which can all open up a system to more threats. You also have to consider that the average employee isn?t going to be prone to securing their own devices? at least, not in comparison to how their workplace devices should be secured. Furthermore, because many employees are likely to use a personal device, they will need to have some means of accessing your company?s resources. This is commonly accomplished through the use of remote access software. However, this software is frequently targeted by cybercriminals, putting the company at risk. Insecure Connections On a related note, your employees are going to need access to your network in order to work remotely (or access to the Internet, at the very least). Yet, the same issue with personally-owned technology bleeds over into the connections that your employees use. Network connections in the home, as we?ve already established, simply aren?t going to be nearly as secure as the ones that are accessible in the office as the same standards aren?t being enforced. Budget routers and modems will typically feature a lack of integrated security and support from the manufacturer, as do the connected devices that are found everywhere nowadays. If this inherent insecurity isn?t resolved by additional measures and best practices, attackers can take advantage of it. Publicly-accessible hotspots and some home networks feature minimal protections and are therefore insufficient for professional use as well. Fake Wi-Fi networks are common amongst attackers as a means of fooling their targets into leaving themselves vulnerable. User Behaviors Finally, you also need to consider how your employees are treating their security. The concept of phishing attacks and spoofing isn?t exactly top-of-mind when someone is at home, but the threats are still there. You need to be sure that your team understands that all the same security policies and procedures are going to be in place while they work remotely, and actually become even more important. Unfortunately, while it is less common than one might initially assume, employee misconduct is something that needs to be considered whenever remote work is implemented. Whether an employee is slacking off throughout the day, or even going rogue, you need to be sure that your employees are sufficiently monitored to catch (and ideally mitigate) these threats. As a managed service provider, White Mountain IT Services is here to assist your business. That doesn?t change just because your team may not be in the office. For help in putting the solutions in place that can minimize these risks, reach out to our team at (603) 889-0800.
What follows are the measures that the major providers are now enacting via their offers to their customers. AT&T Late payments no longer incur fees or termination of service AT&T hotspots are now publicly accessible Eliminated data caps and overage fees Comcast Late payments no longer incur fees or termination of service Comcast hotspots are now publicly accessible Comcast?s 1TB data cap is paused Data speeds are boosted to 25/3 megabits per second All new and existing Internet Essentials customers get two months of complimentary service Spectrum Two months of 100Mbps broadband and Wi-Fi is free to households with kids still in school or college Spectrum hotspots are now publicly accessible T-Mobile (Including Sprint, Post-Merger) Late payments no longer incur fees or termination of service Unlimited data and 20GB of hotspot data Free calls to select countries impacted by COVID-19 Verizon Late payments no longer incur fees or termination of service for residences or small businesses Verizon hotspots are now publicly accessible The shift to 5G service has been accelerated Of course, there is no guarantee that these changes will continue once the coronavirus situation has been reduced or resolved. However, there is no telling how consumers will react to returning to how things once were–so there may be some prospect of these changes becoming a little more permanent. How has your business coped with the effects of the coronavirus outbreak? Tell us in the comments!
Crypto Ransomware Crypto ransomware works via a particularly insidious approach: it encrypts each of your files individually, ensuring that your access is completely blocked. Then, as any ransomware would, it starts a timer that counts down to when all of these files are set to be deleted. When someone is targeted by crypto ransomware, the only real option is to completely wipe the system and restore from a backup. We will never recommend that someone pays a ransomware demand, as there is no guarantee that even paying it will result in the return of your files. This is part of the reason that we always encourage businesses to keep a backup in the cloud. Extortionware AKA ?doxware,? extortionware operates similarly to how crypto ransomware does. Files are encrypted and payment is demanded, and the same general concepts bleed over. The big difference is that extortionware threatens to leak the encrypted data, rather than delete it. While the leverage this gives the attacker is pretty much the opposite kind than that of crypto ransomware, it has proven to be just as effective in convincing the target to pay up. Locker Ransomware This ransomware seals off access to the user?s entire system, doing nothing to the files themselves but rendering a device essentially useless, save for the capability to pay said ransomware?s demands. This makes it very similar to crypto ransomware, just without the threat of deletion. Scareware Scareware is named primarily due to the tactics it uses to infiltrate its victims? systems. Disguised as some kind of antivirus or other security program, scareware falsely alerts the target to issues present on the device and offers to resolve it for a fee. While not everyone feels that this technically classifies as ransomware, the undeniable similarity in their methods certainly links the two terms together. What You Can Do About It: Protecting your business from ransomware really boils down to a few key best practices: Educate your entire staff: Your team needs to know what to keep an eye out for to spot ransomware preemptively, and how to approach it in order to keep it from successfully taking root. Keep a backup: If ransomware does manage to encrypt your documents, you will want a backup ready to restore from. Update your software: Ransomware takes advantage of unpatched exploits in order to successfully infiltrate a system. Applying patches and otherwise updating your system can eliminate a lot of these weak points. An exploitative issue like ransomware will stoop to really low levels to carry out its mission. For instance, one in particular has been spotted and coined as CovidLock, as it capitalizes upon a malicious coronavirus tracking application installed on Android devices. However, you can have a reliable resource in your corner to help your business defend itself. White Mountain IT Services is ready to be that resource and reinforce your cybersecurity and attend to your other IT needs. Learn more by reading some of our other blogs and the other content on our website, or by talking to us at (603) 889-0800.
Creating a PDF Document There are a few ways to create a PDF, based on effectively any document you have. The simplest way is to start to ?print? whatever it is you want saved as a PDF, and select Save as PDF as your destination. Mind you, this does not give you the option to edit these PDFs. If you will need to do that while preserving the existing formatting, you will likely need to invest in a dedicated program, which we can help you do. Converting a PDF to a Google Doc or Microsoft Word Document Sometimes, a PDF may need to be edited–more specifically, the text on the PDF–which means that it might help to convert it to the file type that suits your program of choice. A quick disclaimer: in order to actually convert your PDFs to the Word format, you will need to pay for a subscription to either Adobe Acrobat Reader DC or Acrobat DC. Once you have Acrobat installed, simply open the PDF you want to edit, click Export PDF, select Microsoft Word, and then select Word Document. Clicking Export enables you to save your new .docx file where you want it. From there, you are free to make any changes in Word before saving it as a PDF once again. Google Docs can actually open a simple PDF with little trouble, although elements like lists, tables, and footnotes can cause some difficulty. While in your Google Drive account, simply drag your PDF file into the location you want to upload it. Once it is uploaded, right-click it and navigate to Open with > Google Docs. Your newly editable file will be saved with the same name and extension, but a different icon. The few caveats: your document has to be oriented correctly for this to work, and common fonts (like Arial or Times New Roman) work best. For more handy tips, subscribe to our blog! To discuss any of your IT implementations with our professionals, give White Mountain IT Services a call at (603) 889-0800.