Cybersecurity tips for your family and business by Felipe Neto

I would like to share this summary that I believe anyone using some form of internet service (basically all of us) should be aware of. It protects us as individuals, our friends and family, and the company you work for. The book is called “The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime.” It’s an easy read for everyone.  To avoid a lengthy post, I’ve put few bullets of my favorites takeaway to avoid becoming a victim:

1. Free Wi-Fi avoid it if possible. If really necessary, open a VPN to encrypt all your traffic.

2. Schedule a reminder to do a manual backup to an external storage. Unplug it after backup to keep it safe and secured.

3. Don’t connect random USB sticks to your device.

4. Expand security policies to mobile devices:

-Install minimum apps if smart device is also used for business like e-mail
-Keep inventory of remote workers’ smart device connections: routers, switches, door locks, cameras, thermostats, etc.
-Check for default password, firmware updates, delete/remove users with unnecessary privileges.
-Develop a DLP policy for smart devices to mitigate cases of device theft or loss.

5. Have remote workers connect to a guest WLAN to isolate the network used for corporate connection.

6. Have a policy and plan for recovery in case of cyber-attack. Möbius Partners can help.

7. Use different a different password for each login. An encrypted password manager can help you remember the various passwords.

8. Use two-form factor identification. Passwords get compromised, and two-form factor will provide another layer of protection.

9. Do not click on social media e-mails. If you want to accept a new LinkedIn connection, log into LinkedIn and accept from there.

10. Scrutinize e-mails before clicking or replying. If it involves a financial transaction, it is best to call.

Additional update 3.16.20 – In the wake of the COVID pandemic, Felipe had this to add:

Just as quick reminder to keep these recommended #cybersecurity practices on your #remoteworkforce enablement strategy when focusing on #VPN access.

VPN Access and #MFA or #OTP

  • As mentioned before, if MFA is available, enable it!
    • Weak passwords are vulnerable and can be compromised and credentials there is a plethora of stolen credential in the market, VPN access is not immune to these threats.
    • Enabling MFA with VPN authentication it provides a #strongdefense layer against VPN hacking attempts
  • OTP (One Time Password), if available enable it!
    • Same as MFA, but this is more like the established RSA token that keeps changing, it is another strong practice to protect your VPN.
  • MFA strengthen your defense to avoid #databreach and meet #compliance requirements such as #HIPAA and #NIST 800-171 as example.
  • Most MFA solutions protect both on-premises and cloud access or applications, delivering a reliable consistent enterprise solution.
  • When users leverage their own devices such as laptops, desktops or mobile devices (BYOD), it is critical to keep asset inventory to account for lost or stolen and develop policies for access removal.
  • Aligns with Enterprise #zerotrust security approach to keep corporate network secure from #cyberthreats

If you have any questions, please don’t hesitate to reach out. Click here to find out more about our security offerings.

Felipe Neto

Senior Solutions Architect


Subscribe for Email Updates

Speak with an
IT Professional Today!

Please fill out this form and we'll get right back to you.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.