{"id":7951,"date":"2020-05-27T06:05:25","date_gmt":"2020-05-27T06:05:25","guid":{"rendered":"http:\/\/blog.experfy.com\/?p=7951"},"modified":"2023-12-11T12:07:17","modified_gmt":"2023-12-11T12:07:17","slug":"working-from-home-are-you-cybersecure-part-1","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/future-of-work\/working-from-home-are-you-cybersecure-part-1\/","title":{"rendered":"Working from Home? Are you Cybersecure? (Part 1)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7951\" class=\"elementor elementor-7951\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-b1c95f7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b1c95f7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-30a1af35\" data-id=\"30a1af35\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a31acaa elementor-widget elementor-widget-text-editor\" data-id=\"3a31acaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>The coronavirus is turning all of our lives upside down. My family and friends in the UK have been on lock-down for a several weeks now. Here in Alabama, we just went into shelter-in-place mode a couple of days ago as I pen these words.<\/p>\n\n\n\n<p>As a result, a lot of people who used to spend their days in an office environment are now working from home. The problem is that many of them are woefully ill-equipped with regard to managing cybersecurity in their homes.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2763e16 elementor-widget elementor-widget-text-editor\" data-id=\"2763e16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>We should also spare a thought for the poor corporate IT guys and gals. They\u2019ve suddenly transitioned from having only a small percentage of the employees working from home to almost 100%. As a result, many IT departments are now frantically scurrying around trying to plug security holes and bolster the cybersecurity status of their workforce.<\/p>\n\n\n\n<p>As is usually the case, I\u2019m a bit of square peg trying to fit in a round hole. As a freelance technology consultant and technical writer, I could have a home office, but we don\u2019t really have the room in our house, so I rent an office downtown. Apart from anything else, this gives me a place to store all of my technical books and hobby projects, which tend to make strange sounds and flash a lot of LEDs (the projects, not the books). Unaccountably, my wife (Gina the Gorgeous) feels these wondrous artifacts don\u2019t adequately reflect the ambiance for which she\u2019s striving. Also, arriving at the office before 8:00 a.m. every morning and not leaving until 5:00 p.m. or later in the evening almost makes it seem like I have a real job.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-7a5154f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7a5154f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-972909d\" data-id=\"972909d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c3147d1 elementor-widget elementor-widget-text-editor\" data-id=\"c3147d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>Even though we haven\u2019t been on lock-down until this past Saturday, I\u2019ve been working from home for the past couple of weeks using my laptop computer. The problem is that I\u2019m much less efficient on my laptop than I am on my full-up system. Thus, when we heard the news that the lock-down was going into effect on Saturday at 5:00 p.m., I decided to make a run for the office and retrieve my main machine. As seen in the photo at the start of this column, I just finished setting everything up on the table in our breakfast nook, plus I brought a folding table in from the garage.<\/p>\n\n\n\n<p>On the breakfast table are my three 28&#8243; monitors forming a single desktop. On the fold-up table is my printer, plus the whole table is covered with an anti-static mat for when I prototype my electronic doodads, gizmos, and thingamabobs. Under the table is my tower computer and uninterruptible power supply (UPS). In the event of a loss of power, the UPS can keep everything running long enough for me to save my work, exit out of my applications, and close things down gracefully. In reality, it only has to \u201chold the line\u201d for about 15 seconds until the natural gas emergency generator I had installed a few years ago kicks in, but it\u2019s better to be safe than sorry.<\/p>\n\n\n<hr class=\"wp-block-separator\" \/>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-44e3433 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"44e3433\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-97e2a41\" data-id=\"97e2a41\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e11fbd2 elementor-widget elementor-widget-heading\" data-id=\"e11fbd2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\n<h2 class=\"wp-block-heading\" id=\"4b8a\">Cybersecurity<\/h2>\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c40b78 elementor-widget elementor-widget-text-editor\" data-id=\"0c40b78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>When it comes to cybersecurity, I think I have a fairly typical setup. Although my friends in security say Linux is best, like many people I use Windows 10 as my operating system (OS). I augment the native\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Windows_Defender\" target=\"_blank\" rel=\"noreferrer noopener\">Windows Defender Antivirus<\/a>\u00a0with\u00a0<a href=\"https:\/\/us.norton.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Norton Antivirus<\/a>. You have to be careful here because antivirus tools work deep down, interposing themselves between the OS and the rest of the system. Windows Defender and Norton play well together, but some combinations may see each other as viruses and try to \u201cfight it out\u201d between themselves.<\/p>\n\n\n\n<p>I also store all of my data files in a\u00a0<a href=\"https:\/\/www.dropbox.com\/h\" target=\"_blank\" rel=\"noreferrer noopener\">DropBox<\/a>\u00a0folder on my computer. This means that whenever I move, rename, delete, or modify a file, including hitting the \u201cSave\u201d button while editing a file, in addition to taking place locally on my computer, that change is immediately uploaded to the DropBox cloud.<\/p>\n\n\n\n<p>One thing I worry about is my machine becoming infected by ransomware. In this case, a malicious application encrypts all of the data files on your system, after which the nefarious perpetrator tries to extort money from you (typically in the form of an untraceable cybercurrency like Bitcoin) with the promise of decrypting them again. One problem here \u2014 apart from the obvious one \u2014 is that, as each of my files was encrypted, DropBox would see that as a change and copy the corrupted file up into the cloud (sad face).<\/p>\n\n\n\n<p>In order to mitigate against this, once a week I disconnect my computer from the internet, run a full virus scan, plug in an external USB solid-state drive (SSD), copy my DropBox folder to the SSD, unplug (\u201cair-gap\u201d) the SSD, and reconnect the computer to the internet. Of course, there\u2019s always a chance I unwittingly backed up some malware that slipped through the net, but you can only do the best you can do. Also, DropBox has a nice \u201cRewind\u201d feature that would allow me to \u201cwind back\u201d my account to any time in the past 30 days (or up to 180 days for those using the more expensive accounts).<\/p>\n\n\n\n<p>So, the above describes my own setup, which I would regard as being fairly typical. One point we haven\u2019t touched on is that of virtual private networks (VPNs). The sad truth is that using a VPN may not protect you as much as you might hope, but we\u2019ll save the grisly details for <a href=\"https:\/\/www.experfy.com\/blog\/working-from-home-are-you-cybersecure-part-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">Part 2<\/a>. Until then, I welcome any cybersecurity-related comments, questions, and suggestions, along with any cybersecurity stories you care to share.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>IT workforce suddenly transitioned from having only a small percentage of the employees working from home to almost 100%. As a result, many IT departments are now frantically scurrying around trying to plug security holes and bolster the cybersecurity status of their workforce.<\/p>\n","protected":false},"author":760,"featured_media":8046,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[182],"tags":[127,108,220],"ppma_author":[3615],"class_list":["post-7951","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-future-of-work","tag-cybersecurity","tag-future-of-work","tag-work-from-home"],"authors":[{"term_id":3615,"user_id":760,"is_guest":0,"slug":"clive-max-maxfield-2-2","display_name":"Clive Maxfield","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_d96bfe3c-1e79-40e7-98cd-26c9c80fb5b5-150x150.jpg","user_url":"https:\/\/www.clivemaxfield.com\/coolbeans\/","last_name":"Maxfield","first_name":"Clive","job_title":"","description":"Clive (Max) Maxfield is Collector and Communicator of Technological Information at Maxfield High-Tech Consulting. He wrote books on Electronics, Computing, FPGAs, Mathematics, and 3D Graphics. In the past, he had acted as Contributing Editor, Editor, and Editor-in-Chief at a variety of publications, including EETimes.com, Embedded.com, and EEWeb.com."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/7951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/760"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=7951"}],"version-history":[{"count":5,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/7951\/revisions"}],"predecessor-version":[{"id":34826,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/7951\/revisions\/34826"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/8046"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=7951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=7951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=7951"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=7951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}