{"id":30363,"date":"2020-08-18T06:00:07","date_gmt":"2020-08-18T12:00:07","guid":{"rendered":"https://www.webroot.com/blog/?p=30363"},"modified":"2020-08-21T09:50:50","modified_gmt":"2020-08-21T15:50:50","slug":"wfh-for-the-long-haul-these-tips-will-help-you-create-a-cyber-resilient-home-network","status":"publish","type":"post","link":"https://www.webroot.com/blog/2020\/08\/18\/wfh-for-the-long-haul-these-tips-will-help-you-create-a-cyber-resilient-home-network\/","title":{"rendered":"WFH for the Long Haul? These Tips Will Help You Create a Cyber Resilient Home Network"},"content":{"rendered":"\n<p>Cyber resilience is being put to the test during the coronavirus pandemic. As more and more users work from home, it\u2019s becoming increasingly difficult for IT teams to ensure uniform cyber security on home devices and networks that they don\u2019t own or control. At the same time, cybercriminals are <a href=\"https:\/\/www.helpnetsecurity.com\/2020\/04\/07\/covid-19-malicious-sites\/\">using the pandemic<\/a> to launch more deceptive attacks. In this post, we\u2019ll break down a few steps you can take to add resilience to your home network, so you don\u2019t have to sacrifice security for convenience during the global pandemic. We cover all of these tips and more in our <a href=\"https:\/\/mypage.webroot.com\/work-from-home-playbook.html\">Work From Home Playbook<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a class=\"banner-cta\" href=\"https:\/\/mypage.webroot.com\/work-from-home-playbook.html?sc=7013i000000cfuTAAQ\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" loading=\"lazy\" width=\"800\" height=\"100\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2020\/08\/10174004\/WFH-Playbook-Blog-banner-800x100-1.jpg\" alt=\"\" class=\"wp-image-30365\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2020\/08\/10174004\/WFH-Playbook-Blog-banner-800x100-1.jpg 800w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2020\/08\/10174004\/WFH-Playbook-Blog-banner-800x100-1-300x38.jpg 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2020\/08\/10174004\/WFH-Playbook-Blog-banner-800x100-1-768x96.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><\/figure>\n\n\n\n<h2>The secure tunnel<\/h2>\n\n\n\n<p>We lose a measure of security\nthe minute we step outside the protective shell of our corporate network. The\naverage home network is significantly less secure than corporate networks. This\nleaves remote workers more vulnerable to attacks anytime they\u2019re not connected\nto the corporate network. <\/p>\n\n\n\n<p>Luckily, you can easily\nimprove your at-home security by using a virtual private network (VPN). With a VPN,\nyou can establish a secure tunnel between your home network and your corporate\nenvironment, making your home connection more immune to outsider attacks. A VPN\nextends your home network \u2013 or connection from the local coffee shop \u2013 across a\npublic network, allowing you to interact with your corporate system as if you\nwere connected directly to it. This allows applications to operate securely and\nencryption to be enabled within the connection, ultimately privatizing any data\nbeing shared or input.<\/p>\n\n\n\n<h2>Handshake hygiene <\/h2>\n\n\n\n<p>A clean handshake is healthier\nin the physical world. And it\u2019s the same with the digital handshake between\nyour home devices and your corporate network. Anytime someone from outside the\nnetwork attempts to log on, there\u2019s a risk the person isn\u2019t who they say they\nare. Login credentials are stolen all the time. In many scenarios, all it takes\nis a username and password to gain access to the company network. Once inside,\ncyberthieves can unload malicious payloads or find additional user credentials\nto launch even more pernicious attacks. But by adding just one extra layer of\nsecurity in the form of an additional checkpoint, it\u2019s possible to thwart most\nattacks that rely on only a username and password. <\/p>\n\n\n\n<p>That\u2019s why multi-factor\nauthentication (MFA) has become the go-to method for adding extra verification\nsteps to confirm that the person logging on is truly who they say they are.\nWith MFA, the user verifies their identity using knowledge only they have, like\na password or answers to challenge questions. As an additional verification\nstep, the user supplies an item, like a YubiKey or a one-time password sent to\na mobile device. Lastly is an inherited characteristic unique to who the\nperson, such as a fingerprint, retina scan, or voice recognition. In today\u2019s\nhighly regulated business environment, most businesses make MFA mandatory for\nemployees logging in from outside the network.<\/p>\n\n\n\n<h2>First, second and third lines of defense<\/h2>\n\n\n\n<p>Cybercriminals have a full quiver\nof options when it comes to launching attacks. But the good news is that there\nare also multiple solutions for defending home systems against them. The best\nway to secure the home network is to use a multi-layered cyber resilience\nstrategy, also known as defense in depth. <\/p>\n\n\n\n<p>This approach uses multiple\nlayers of security to protect home devices and the networks they\u2019re connected\nto. Here\u2019s what that looks like:<\/p>\n\n\n\n<ul><li><strong>Backup <\/strong>\u2013 Backup with point-in-time restore gives you multiple\nrecovery points to choose from. It ensures you can roll back to a prior state\nbefore the ransomware virus began corrupting the system.<\/li><\/ul>\n\n\n\n<ul><li><strong>Advanced\nthreat intelligence<\/strong> \u2013 Premium antivirus\nprotection is still the first line of defense. And antivirus that is backed by\nadvanced threat intelligence, identification and mitigation is essential for\npreventing known threats from penetrating your system.<\/li><\/ul>\n\n\n\n<ul><li><strong>Patch and\nupdate applications <\/strong>\u2013 Cybercriminals\nare experts at identifying and exploiting security vulnerabilities. Failing to\ninstall necessary security patches and update to the latest version of\napplications and operating systems can leave your devices exposed to an attack.<\/li><\/ul>\n\n\n\n<h2>Learn more<\/h2>\n\n\n\n<p>Cyber resilience while working from home is every bit as critical as working on-site. For more tips on how to add resilience to your home environment, and how to prepare your space for working from home long-term, download the <a href=\"https:\/\/mypage.webroot.com\/work-from-home-playbook.html\">Work from Home Playbook<\/a>. <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" loading=\"lazy\" width=\"800\" height=\"100\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2020\/08\/10174004\/WFH-Playbook-Blog-banner-800x100-1.jpg\" alt=\"\" class=\"wp-image-30365\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2020\/08\/10174004\/WFH-Playbook-Blog-banner-800x100-1.jpg 800w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2020\/08\/10174004\/WFH-Playbook-Blog-banner-800x100-1-300x38.jpg 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2020\/08\/10174004\/WFH-Playbook-Blog-banner-800x100-1-768x96.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Cyber resilience is being put to the test during the coronavirus pandemic. As more and more users work from home, it\u2019s becoming increasingly difficult for IT teams to ensure uniform cyber security on home devices and networks that they don\u2019t own or control. At the same time, cybercriminals are using the pandemic to launch more [&hellip;]<\/p>\n","protected":false},"author":175,"featured_media":30367,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2985],"tags":[],"yst_prominent_words":[3565,8895,8881,4971,25287,3517,5405,21975,21981,25677,4521,25299,25675,25679,3479,3789,21499,25315,25673,25185],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30363"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/175"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=30363"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30363\/revisions"}],"predecessor-version":[{"id":30385,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30363\/revisions\/30385"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/30367"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=30363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=30363"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=30363"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=30363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}