Search
  • Roark Tech Services

Remote Learning Cybersecurity Best Practices - Part 3

This is our final installment of Cybersecurity Best Practices for Remote Learning. Today we provide additional steps that help you and your children remain safe online.

Remove Unnecessary Remote-Control Software from Child Devices

The Remote Desktop Protocol (RDP) is found in every modern version of Windows and is designed to allow remote control of a computer, such as accessing the office computer from home or allowing a trusted person to assist with tech support. A trusted IT partner requires only one remote access tool and will typically choose on that is secure and requires your permission to access your system. If you don’t work with a trusted IT partner remove the remote-control applications from devices your children use to avoid unwanted and dangerous connections.

Teach Your Kids The Importance Of Strong Passwords

Passwords are one of the weakest links in the whole internet security chain, but in today’s world there's no way around them. The challenge with passwords is the need to remember so many and for that reason, most people create something simple, easy to remember or use the same password for every account, such as their address, birthday, pet’s name or a combination. All to the delight of hackers who examine social media to make accurate guesses at the passwords people create. 

Replacing passwords with “pass-phrases” is a great way reduce the chance of getting hacked because of a weak password. Using a password manager, such as LastPass or Dashlane, is also a great way to have complex passwords created for you without the need to ever remember them.  A good passphrase includes:

  • At least five words mixed with numbers and special characters

  • At least 19 characters

A passphrase should never include:

  • Famous or well-known song lyrics or sayings, movie lines or book titles

  • Do not use anything easily found online, such as quotations

Setup Multi-factor Authentication When Possible

In addition to a strong, complex password or passphrase, multi-factor or two-factor authentication is an additional layer of protection that ensures your safety even if someone guesses your password. After two-factor authentication is setup, you sign into your account in two steps using something you know, like your password and something you have, like your phone. Without authentication on both, login is not permitted.

Many leading online stores, such as Amazon, Apple and Microsoft offer two-factor authentication. 


Read installments one and two for more best practices.

CONTACT US

Have a Question or Need Quick Help?

Send us a message or use the chat function and a technician will jump right on it. Our technicians are available 24x7, after hours and on the weekends to respond to emergencies.

Use this form to sign up for our weekly newsletter.

HEADQUARTERS

515 Madison Avenue, 8th Floor

New York, NY 10022

REGIONAL OFFICE

3801 PGA Boulevard, Suite 600

Palm Beach Gardens, FL 33410

info@roarktechservices.com​

(212) 682-3555

linkedin-white.png
twitter-white.png
instagram-white.png
facebook-white.png

@copyright Roark Tech Services 2020