If You Connect It, Protect It

Does this statement seem a bit daunting to you?  Almost everything is connected in our lives today, both personally and professionally.  If you are like me, you have computers, tablets, phones, TVs, gaming console, video streaming devices, thermostat, lights, coffeepot, garage door opener, etc. all connected to your home network with access to the Internet.  And it’s great! Having these devices connected allows us to do all the things we want to do: watch our favorite TV programs when we want to, connect with friends, auto-adjust settings in our home, manage our finances, and the list goes on.  Most of us are working from home, our kids attending school at home; likely our home network and internet connection has never been so used.  With more use and more devices, our connections and interactions with services and organizations has exploded.

The interconnectivity of our networks, information, devices, and applications is doing wonders for the way we work and play today.  But, what is being exposed?  Are we even aware of the exposure we are creating?  How many times do we reuse passwords? Are data/communications encrypted?

When everything is connected, how can we protect everything?  Some networks and/or devices are protected, while others are not.  We place a great deal of trust in these networks, applications and interconnections; However, we must be vigilant to make sure we are doing our part in protecting information.  Here are some simple things we can implement, at home, at work, and at school:

Think About It

Numerous devices, numerous networks; a mixture that inevitably raises concern for things like exposure of our data to unknown parties, malware that can proliferate and steal data and information, or worse yet, hold it for ransom. So, think about what you are accessing, where you are accessing it from, and what you are using it to access it.

Patch It

It is important to keep devices, systems, and applications up-to-date.  While there are updates to functionality as improvements to the user experience, often included are security patches, that fix vulnerabilities. So make a point to install the patches, fixes, and updates.

Save It, Change It

Every system/application that is accessed now requires a password.  Do you use the same password over and over for different applications?  Password vaults like LastPass or 1Password allow you to create and manage long and complex passwords for all your accounts with ease. So, there is no excuse to reuse passwords or set simple passwords because it is easier to remember!  Take the time to create and remember just one long complex password…the one for the vault!

Configure It

Most applications today have some option for additional authentication.  If the application has the option, turn it on!  Passwords alone, no matter how complex, can be bypassed by various means. Enabling multi-factor authentication will add another layer to defend your accounts, information, and maybe your identity.

Install it, Configure It, Run it

Add layers of detection and monitoring to your devices whenever possible. Anti-malware, firewalls, web filtering, intrusion detection, process monitoring, anti-ransomware, and more are available in all-in-one protection applications or even native functionality in devices and systems.  The trick is they have to be installed, configured, and enabled.  For devices where you can’t install additional protection software, review and configure all the settings that limit services and functionality to only what is needed.  Look for options on your home network where you can limit network access or detect malicious activity in traffic patterns.

Watch it

Be aware of your digital surroundings.  Be alert for imposters. Don’t overshare on social media. Look out for phishing emails. Be cautious about the WiFi hotspots you connect to. Take care when disposing of personal information.

When you connect, protect!

OCTELLIENT - Our mission: simplify information security. With a Business First approach, we want to help you and your organization get to your core priorities and make the most of your infosec investments.  Our goal is to be your side-by-side partner, working together to navigate a tailored infosec strategy and bring expert advice to your toughest challenges.

 

Ask us about Propulsion, Deepwater, and the 8-point Dossier

info@octellient.com

www.octellient.com

Previous
Previous

Securing Devices at Home and Work