{"id":19984,"date":"2017-10-31T09:00:34","date_gmt":"2017-10-31T13:00:34","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=19984"},"modified":"2019-01-24T06:54:34","modified_gmt":"2019-01-24T11:54:34","slug":"cybersecurity-tips-for-work","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/cybersecurity-tips-for-work\/19984\/","title":{"rendered":"Cybersecurity at work"},"content":{"rendered":"<p>As <a href=\"https:\/\/kaspersky.com\/blog\/tag\/ncsam\/\" target=\"_blank\" rel=\"noopener nofollow\">Cybersecurity Awareness Month<\/a> comes to a close, we want to remind you that cybersecurity issues affect all of us year-round. Today we <a href=\"https:\/\/staysafeonline.org\/ncsam\/ncsam-champions\/\" target=\"_blank\" rel=\"noopener nofollow\">champion<\/a> some best practices for the workplace.<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/11\/01063024\/cybersecurity-at-work-featured.jpg\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/11\/01063024\/cybersecurity-at-work-featured-1024x672.jpg\" alt=\"\" width=\"1024\" height=\"672\" class=\"aligncenter size-large wp-image-19985\"><\/a><\/p>\n<p>Why bother with cybersecurity if you are not the one responsible for it? Because even if you don\u2019t work in IT, cybersecurity is still part of your job, and if something goes wrong because of you, you may be held accountable.<\/p>\n<p>For those who work in large corporate environments, the best starter is to follow the plans in place from your IT department. If your company does not have an in-house IT team or consultants \u2014 for example, those in small office\/home office shops \u2014 being a small target doesn\u2019t mean you don\u2019t have to worry about cybersecurity. We have some tips for small-business folks to bookmark and share with staff as well.<\/p>\n<p><strong><\/strong><\/p>\n<h2>Don\u2019t write down passwords<\/h2>\n<p><\/p>\n<p>We know that everyone has a lot going on at work, and passwords \u2014 a different, strong password for every product and service \u2014 are hard to remember. However, sharing passwords or writing them on a sticky note for anyone to see is an easy way to compromise your company or your own personal data.<\/p>\n<p>So, what can you do? Try a password manager that generates secure passwords and remembers them for you. There are many options out there, and we <a href=\"https:\/\/www.kaspersky.com\/password-manager\" target=\"_blank\" rel=\"noopener nofollow\">offer one that\u2019s free<\/a>.<\/p>\n<p><strong><\/strong><\/p>\n<h3>Use Wi-Fi right<\/h3>\n<p><\/p>\n<p>No matter what industry you work in, you have probably done some work outside of your office. Today, Wi-Fi seems like a necessity of life \u2014 heck, places ranging from gas stations to coffee shops to airports all offer free Wi-Fi. Everyone loves free Wi-Fi, right?<\/p>\n<p>Right. But with popularity comes trouble, and users of Wi-Fi hotspots need to take extra caution to avoid some common pitfalls.<\/p>\n<p>If you enter a free Wi-Fi location, make sure that the network you are connecting to is the one provided. The provider may have a sign up on the wall, or you can ask someone who works there. Check the spelling carefully and don\u2019t be fooled by near-dupes. Also, if you are connecting to Wi-Fi, use your company\u2019s VPN and avoid doing sensitive work or making any financial transactions. Your company doesn\u2019t have its own VPN? Use our <a href=\"https:\/\/www.kaspersky.com\/advert\/secure-connection-vpn?redef=1&amp;THRU&amp;reseller=gl_nfckdailyit_acq_ona_smm__onl_b2c_kasperskydaily_ban_______\" target=\"_blank\" rel=\"noopener nofollow\">Secure Connection<\/a> instead.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksec\">\n<p>On the flip side, your company\u2019s Wi-Fi is also a target. Larger businesses with IT departments should have some expertise in deploying Wi-Fi securely, but here are a couple of tips for smaller ones:<\/p>\n<ol>\n<li>Secure your network with a strong password;<\/li>\n<li>Grant access only to people who need to be tied to the network;<\/li>\n<li>Set up a guest network if you have a lot of visitors, and limit its access to your critical infrastructure.<\/li>\n<\/ol>\n<p><strong><\/strong><\/p>\n<h3>Don\u2019t use random USB drives<\/h3>\n<p><\/p>\n<p>What would you do if you found a USB thumb drive in your office parking lot?<\/p>\n<p>Sadly, research has shown that most will <a href=\"https:\/\/www.kaspersky.com\/blog\/usb-in-mail\/13054\/\" target=\"_blank\" rel=\"noopener nofollow\">plug it into their computers<\/a>, which is bad news for companies. The reason a strange USB drive is enticing is that you never know what might be on that drive. It <a href=\"https:\/\/www.kaspersky.com\/blog\/mr-robot-safety-tips\/19713\/\" target=\"_blank\" rel=\"noopener nofollow\">could be malware<\/a> that could cause some serious damage to your corporate network or <a href=\"https:\/\/en.wikipedia.org\/wiki\/USB_Killer\" target=\"_blank\" rel=\"noopener nofollow\">to your physical device<\/a>.<\/p>\n<p><strong><\/strong><\/p>\n<h3>Avoid phishing trips<\/h3>\n<p><\/p>\n<p>One of the approaches criminals use to get into corporate networks is impersonating a legitimate e-mail sender. No company, large or small, is immune to phishing; it\u2019s happened to <a href=\"https:\/\/www.kaspersky.com\/blog\/snapchat-phishing\/11441\/\" target=\"_blank\" rel=\"noopener nofollow\">some of the best<\/a>.<\/p>\n<p>At a small business, you may think that you are not a target, but your data and access to your customer files is a big deal. Criminals salivate at the thought of stealing the personally identifiable data held in your customer records. They sell and trade it on dark parts of the Internet. So, how can you avoid phishing? It\u2019s deceptively simple: Think before you click.<\/p>\n<p>What should you think about?<\/p>\n<ol>\n<li>Is the link good? Always check every link before clicking. Hover over it to preview the URL, and look carefully for any misspelling or other irregularity. If you\u2019re unsure at all, simply open a new browser tab and enter the main URL of the site manually.<\/li>\n<li>Does the message include an attachment? Even if a message seems legitimate, treat links and attachments with suspicion \u2014 a colleague could have been hacked.<\/li>\n<li>Does the message seem reasonable and legitimate? Be cautious even with internal messages from your own office. It\u2019s simply not that hard to fabricate a fake letter that looks like a real one \u2014 for example, authorizing a payment \u2014 although typically, odd syntax or other unexpected irregularities are present and should raise a red flag.<\/li>\n<\/ol>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos generic\">\n<p><strong><\/strong><\/p>\n<h3>Back up important data<\/h3>\n<p><\/p>\n<p><a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/ransomware\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">Ransomware<\/a> continues to sweep across the Internet. Turns out, when a criminal blocks access to their data or entire computer, victims panic and pay ransom to get their files unlocked. Companies are not immune to this. Quite the contrary: Companies are a desired target because they are willing to pay significantly more than the average individual to get their files back. The recent <a href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-for-b2b\/16544\/\" target=\"_blank\" rel=\"noopener nofollow\">WannaCry epidemic<\/a> is a good example of that.<\/p>\n<p>The great thing here is that you can immunize yourself against ransomware by doing something all companies should do anyway: back up data. If you don\u2019t have regular backups and get hit by ransomware, you\u2019ll be at cybercriminals\u2019 mercy \u2014 or hoping for free decryption tools like those at the <a href=\"https:\/\/www.nomoreransom.org\/ru\/index.html\" target=\"_blank\" rel=\"noopener nofollow\">No More Ransom Project<\/a>. But if you do have backups, you can simply restore your data and continue with business as usual.<\/p>\n<p>So, are you backing up your data at the office? Start-ups and SOHOs, are you saving copies of your data? If not, it\u2019s high time to start. Your business may depend on it. You can automate data backups using <a href=\"https:\/\/www.kaspersky.com\/advert\/small-business-security\/small-office-security?redef=1&amp;THRU&amp;reseller=gl_kdaily_acq_ona_smm__onl_b2c_kasperskydaily_ban____ksos___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Small Office Security<\/a>.<\/p>\n<p><strong><\/strong><\/p>\n<h3>Bonus tip: Physical security<\/h3>\n<p><\/p>\n<p>If you work in a physical office, one piece of security that you always need to be aware of is the human factor \u2014 for example, the building perimeter. Building staff and employers do a lot to ensure safety in the workplace. However, everyone in the office has to have a commitment to one another\u2019s safety. If you see someone you do not recognize in the office or trying to get in, don\u2019t be afraid to ask them a question or to alert building security of a potential intruder.<\/p>\n<p>It is not unheard of for criminals to try to gain access to offices to commit crimes, whether physical or cyber.<\/p>\n<p>Stay vigilant and safe \u2014 and make sure to share these tips with your coworkers.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Cybersecurity basics for your workplace<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FC7CH&amp;text=Cybersecurity+basics+for+your+workplace\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>5 cybersecurity basics that will help you stay safe at work.<\/p>\n","protected":false},"author":636,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2684],"tags":[2507,282,352,2690,2691,97,131,2554],"class_list":{"0":"post-19984","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-special-projects","7":"tag-awareness","8":"tag-cybersecurity","9":"tag-kaspersky-lab","10":"tag-ncsam","11":"tag-north-america","12":"tag-security-2","13":"tag-tips","14":"tag-work"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cybersecurity-tips-for-work\/19984\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cybersecurity-tips-for-work\/13142\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cybersecurity-tips-for-work\/11704\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cybersecurity-tips-for-work\/14744\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cybersecurity-tips-for-work\/14442\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cybersecurity-tips-for-work\/4460\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cybersecurity-tips-for-work\/9748\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cybersecurity-tips-for-work\/9864\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/cybersecurity-tips-for-work\/8491\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cybersecurity-tips-for-work\/15157\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/awareness\/","name":"awareness"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=19984"}],"version-history":[{"count":8,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19984\/revisions"}],"predecessor-version":[{"id":25448,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19984\/revisions\/25448"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=19984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=19984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=19984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}