fbpx

Know These Don’ts of Network Security Part 2-4

Reading Time: 3 minutes Know These Don’ts of Network Security – #BeCyberSmart October is marked globally by various countries and organisations as Cybersecurity Awareness Month. The theme for 2021 is “Do Your Part. #BeCyberSmart.” At iSite Computers, we’ve dedicated this month to publishing a four-part series aimed at creating awareness on fundamental cybersecurity practices for small to medium-sized businesses in South Africa. Share this article series with your employees to stress the critical basics of IT security in order to keep your business protected. This is Part 2 of 4. *** Computer networks support your seamless access to shared company folders, e-mail, the internet, and software like Pastel. Whether you’re working from home, on the move, or simply at the office, your work devices almost always need a network connection to ensure your optimal productivity. But networks can also pose some dire threats to business cybersecurity, especially concerning data and privacy. In this article, learn four bad practices to avoid for smarter network security. (1) Don’t Connect to Public Wi-Fi Hotspots A Wi-Fi hotspot named “Free Guest Wi-Fi” or “Complimentary Coffee Shop Internet” might not be provided by your hotel or cafe. In fact, anyone can create a Wi-Fi hotspot with any name. It […]
Know These Don’ts of Network Security - #BeCyberSmart
Reading Time: 3 minutes

Know These Don’ts of Network Security – #BeCyberSmart

October is marked globally by various countries and organisations as Cybersecurity Awareness Month. The theme for 2021 is “Do Your Part. #BeCyberSmart.”

At iSite Computers, we’ve dedicated this month to publishing a four-part series aimed at creating awareness on fundamental cybersecurity practices for small to medium-sized businesses in South Africa. Share this article series with your employees to stress the critical basics of IT security in order to keep your business protected. This is Part 2 of 4.

***

Computer networks support your seamless access to shared company folders, e-mail, the internet, and software like Pastel.

Whether you’re working from home, on the move, or simply at the office, your work devices almost always need a network connection to ensure your optimal productivity.

But networks can also pose some dire threats to business cybersecurity, especially concerning data and privacy. In this article, learn four bad practices to avoid for smarter network security.

(1) Don’t Connect to Public Wi-Fi Hotspots

A Wi-Fi hotspot named “Free Guest Wi-Fi” or “Complimentary Coffee Shop Internet” might not be provided by your hotel or cafe. In fact, anyone can create a Wi-Fi hotspot with any name.

It can be difficult to identify the difference between a genuine hotspot and a bogus one – hence the name for this type of attack: The evil twin.

The evil twin is a hotspot that looks legitimate, but isn’t. When you connect your device to an evil twin, the attacker may access all the data that travels through the access point.

Hence, never connect to public Wi-Fi hotspots. Along with hotels and food outlets, these are also popular at airports and conference venues.

(2) Don’t Connect to Wi-Fi That Doesn’t Require a Passcode

When you connect to a Wi-Fi hotspot that doesn’t require a passcode, the traffic between your device and the access point won’t be encrypted. This means anything you do while connected to this network could be seen by others.

Your usernames and passwords might be intercepted and viewed by a snoop scanning local Wi-Fi traffic. To guard against this, only connect to a hotspot that requires a passcode. The passcode encrypts the traffic between your device and the access point and makes it more difficult for hackers to snoop on your data.

A virtual private network (VPN) can also protect against a local snoop. A VPN connection encrypts traffic from your device to a system elsewhere – from your laptop to a server at your company, for example. A local snoop would then need to first decrypt the data in order to access it.

(3) Don’t Use a Network Without Your Firewall Enabled

You use Wi-Fi or Ethernet to get information into your system – but networks work in both directions, i.e., a hacker can use the internet to access your computer directly.

A firewall protects your system from a remote attacker. They help ensure the only traffic entering or leaving your network is the traffic you want.

Therefore, ensure the firewall is always enabled on your device. It may have been turned off accidently, during a software update, or for online gaming, etc. Learn how to check your firewall status on Windows and Mac.

If you have a Wi-Fi router at home, check the manufacturer’s instructions to access the administrative settings. Update the router’s firmware, and verify that the router firewall is turned on. The good news is that most routers enable the firewall by default.

Book a Free #BeCyberSmart Consultation for Your Business

Network security starts with implementing fundamental practices like these. But comprehensive protection involves far more intensive multi-layered cybersecurity measures and safeguards.

Book a free, no-obligation cybersecurity consult with iSite Computers to learn how we can help.

Call Isite Computers

Join Our Newsletter

Related Posts

Best Practices for Data Protection in Law Firms

Best Practices for Data Protection in Law Firms

As a law firm operating in South Africa, you are the custodian of sensitive information. Whether it’s client data, case files, or legal documents, the confidentiality and integrity of this data are paramount.  In an era where cyber threats such as ransomware are...

read more
Ransomware Protection Strategies for Law Firms

Ransomware Protection Strategies for Law Firms

Ransomware poses a growing threat to organisations globally – and the legal sector is far from immune. In fact, the sensitive and valuable nature of the data held by law firms makes them a desirable target. With this rising threat, it's imperative for firms to...

read more

Comments

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *