Remote User’s Guide to Cybersecurity
Follow these best practices to secure your environment while working remotely.
A firewall is a network security device (or software) that monitors incoming and outgoing network traffic and decides whether to allow or block it, based on defined security rules. Most operating systems (OSs) include a built-in firewall feature that you should enable for added protection, even if you have an external firewall. For both Mac and Windows OS, the firewall is turned off by default, so it’s important to activate the feature in the settings panel.
Use Ethernet instead of WiFi when possible.
In theory, wireless networks are less secure than an Ethernet connection. Because wireless communication travels through the air, it's easier for hackers to gain access to your data. Ethernet-based connections are considered more secure, since there is a direct connection between your data and the Internet.
Consider using passphrases instead of password and always follow password best practices. (link to our blog)
Change default router passwords.
Default router passwords are designed to be easily remembered and readily available to installation technicians for quick setup. Changing the router default password is similar to buying a house and changing the locks.
Enable Two-Factor Authentication (2FA), a mechanism to double check that your identity is legitimate. It requires two verification factors, a password and a second factor, usually an authenticator code on a mobile device to login. This ensures that a hacker cannot gain access to your account with only a password. Both Windows and Mac users can activate these features in the settings pan