28% of Indians are not aware of their router’s web administrative interface
- Globally, 39.32% employees don’t receive the technology support from their company to work away from the office - Avast shares tips on how people can securely work from home during the COVID-19 outbreak
Companies across the world are making plans to help protect their employees from the coronavirus, and many resorts to having their employees work from home. Avast, a global leader in digital security products, provides tips on how users can safely work from home during the coronavirus outbreak.
Jaya Baloo, CISO at Avast, shares the following advice that companies, and employees can follow to keep their devices safe from virtual viruses, while they shield themselves from the physical coronavirus:
- Corporate security measures
According to an Avast survey, a global average of 39.32% of people said that they don’t receive the technological support or expertise from their employer when they are working from home or in a public place, which makes security a concerning issue. Companies preparing to send their workforce home should ensure they have the support they need to safely work remotely, and take the following steps:
- Make sure employees use pre-approved laptops and smartphones to access corporate materials, including their emails, tools, and documents. These devices should have business-grade security solutions installed on them and be controlled by the company IT department, if applicable
- Arm employees with a list of phone numbers, so they can reach out to a human from their IT team or other responsible people in case they have any IT issues
- Inform employees about the hardware, software, and services they can utilize that are not company issued, but could help to connect and share files with colleagues during the special circumstances
- Lay ground rules for employees when it comes to using personal hardware while working from home, such as printers
- Provide employees with VPN connections they can use to protect their communications
- Enforce two-factor authentication wherever possible to add an extra layer of protection to accounts
- Make sure employees have limited access rights and can only connect to the services they need for their specific tasks, rather than giving employees access to the entire corporate network
- Measures employees can take
There are basic measures for employees who are forced to work from home can take to strengthen their home network security, which will make working from home safer. Employees should log in to their router’s administrative interface to change the device’s login credentials, and also change their Wi-Fi password to a unique and strong password that is made up of at least 16 characters and which ideally is a passphrase, making the long passwords easy to remember. According to an Avast survey, 28% of Indians aren’t aware that their router has a web administrative interface, where they can log in to view and change their router’s settings. We also recommend users check if port forwarding and UPnP are enabled within their router settings and, unless these are being knowingly used, they should also be disabled.
Users can also use features like Avast Wi-Fi Inspector, included in all versions of Avast Antivirus, to check which devices are connected to their network and to check if these are exposed to risks. Networks are only as secure as their weakest link, so it is important to make sure all devices connected to the network are secure, as they could be potential gateways for cybercriminals to access other devices connected to the home network. Wi-Fi Inspector scans the network, checking for devices using ports with empty, default, or weak passwords, and alerts users of these, so they can make a change to secure their network. It also checks IoT devices for passwords that are known to be used by malware botnets in the past, such as the widespread Mirai botnet.
While working from home during the outbreak, employees should also be on the lookout for phishing emails related to the coronavirus including spear-phishing emails. These can appear to come from within the company and can include attachments, links, or a request. It’s important for users to verify the sender’s email address or contact the sender via a different channel to confirm the message was sent from them before opening any attachments, links or fulfilling a request.