<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber security &#8211; kpcomputer</title>
	<atom:link href="https://kpcomputer.tekzini.com/category/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://kpcomputer.tekzini.com</link>
	<description></description>
	<lastBuildDate>Wed, 14 May 2025 10:50:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://kpcomputer.tekzini.com/wp-content/uploads/2025/02/fav-1.png</url>
	<title>Cyber security &#8211; kpcomputer</title>
	<link>https://kpcomputer.tekzini.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Free or Subscription antivirus Which is the Best one</title>
		<link>https://kpcomputer.tekzini.com/free-or-subscription-antivirus-which-is-the-best-one/</link>
					<comments>https://kpcomputer.tekzini.com/free-or-subscription-antivirus-which-is-the-best-one/#respond</comments>
		
		<dc:creator><![CDATA[kp@admin]]></dc:creator>
		<pubDate>Sun, 06 Nov 2022 09:01:12 +0000</pubDate>
				<category><![CDATA[Cyber security]]></category>
		<guid isPermaLink="false">https://kpcomputer.tekzini.com/?p=4223</guid>

					<description><![CDATA[In the market for an antivirus? You’re not alone—every year, millions of people seek out the best protection against malware, viruses, and other online threats. But with so many options on the market, it can be hard to know where to start. Do you want a free or subscription-based antivirus? What’s the difference between them, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>In the market for an antivirus? You’re not alone—every year, millions of people seek out the best protection against malware, viruses, and other online threats. But with so many options on the market, it can be hard to know where to start. Do you want a free or subscription-based antivirus? What’s the difference between them, and which one is right for you? In this blog post, we’ll break down the pros and cons of each option so you can make an informed decision about which antivirus is right for you.</p>
<h2>What is an antivirus?</h2>
<p>An antivirus is a software program that helps protect your computer against viruses and other malicious software. Antiviruses are available for both Windows and Mac computers. There are many different types of antiviruses, but they all work to do the same thing: protect your computer from harm. Some antiviruses are free, while others require a subscription.</p>
<p>There are many different factors to consider when choosing an antivirus, such as price, features, and compatibility. If you are not sure which antivirus is right for you, it is best to consult with a computer expert or read reviews online before making a decision.</p>
<h2>The Different Types of Antiviruses</h2>
<h5>Free Antivirus Software:</h5>
<p>There are many free antivirus software programs available on the internet. However, the quality of these programs can vary greatly. Some free antiviruses may be very good at detecting and removing viruses, while others may not be as effective.</p>
<h5>Subscription Antivirus Software:</h5>
<p>Subscription antivirus software is usually more expensive than free antivirus software. However, it usually provides better protection against viruses and other malware</p>
<h5>Enterprise Antivirus Software:</h5>
<p>Enterprise antivirus software is used by businesses to protect their networks and computers from viruses and other malware. This type of software is usually more expensive than subscription antivirus software.</p>
<h5>Cloud-Based Antivirus Software:</h5>
<p>Cloud-based antivirus software is a newer type of antivirus that uses the cloud to provide protection against viruses and other malware. This type of software is usually more expensive than subscription antivirus software.free antivirus software, but it can offer better protection against viruses and other malware. In addition, subscription antiviruses often provide automatic updates to keep your computer protected against the latest threats.</p>
<h2>Pros and Cons of a Free Antivirus</h2>
<p>There are a number of antivirus software programs available on the market today. Some are free, while others require a subscription in order to use them. So, which is the best option for you? Here, we take a look at the pros and cons of both free and subscription antivirus programs in order to help you decide which is right for you.</p>
<h5>PROS OF A FREE ANTIVIRUS</h5>
<p><strong>1. Cost –</strong> The most obvious advantage of a free antivirus program is that it doesn’t cost anything to use it. This can be a big saving if you need to protect multiple devices, as the cost of subscribing to multiple antivirus programs can quickly add up.</p>
<p><strong>2. Ease of use –</strong> Free antivirus programs are generally very easy to install and use, meaning that even those with little technical knowledge can get them up and running without any problems.</p>
<p><strong>3. Regular updates –</strong> Most free antivirus programs receive regular updates from their developers, ensuring that they are always up-to-date and effective against the latest threats.</p>
<h5>CONS OF A FREE ANTIVIRUS</h5>
<p><strong>1. Limited features –</strong> Free antivirus programs usually have fewer features than their paid-for counterparts. This means that they may not offer as much protection as you’d like, or may not include certain features that you consider essential (such as a firewall).</p>
<p><strong>2. Slower scanning speeds –</strong> Many free antivirus programs also tend to be slower than their paid-for counterparts when scanning your devices for malware. This can be frustrating if you have a lot of devices to scan or if you only have a limited amount of time to do so.</p>
<p><strong>3. Potentially intrusive –</strong> Some free antivirus programs display advertising or other intrusive content in order to generate revenue. This can be annoying and may even slow down your device while the ads are being displayed.</p>
<h5>PROS OF A PAID ANTIVIRUS</h5>
<p><strong>1. Comprehensive protection –</strong> Paid antivirus programs offer much more comprehensive protection than their free counterparts. This means that you can be confident that your devices are well protected against the latest threats.</p>
<p><strong>2. Faster scanning speeds –</strong> Paid antivirus programs also tend to scan your devices much faster than free programs, meaning that you can get on with using your devices sooner rather than later.</p>
<p><strong>3. No ads or other intrusions –</strong> Unlike some free antivirus programs, paid programs do not display advertising or any other intrusive content. This ensures that your experience of using the program is as smooth and seamless as possible.</p>
<h2>CONS OF A PAID ANTIVIRUS</h2>
<h5>1. Cost – The main downside of a paid</h5>
<h2>Pros and Cons of a Subscription Antivirus</h2>
<p>There are a number of different subscription antivirus options available on the market today. Which one is the best for you depends on a number of factors, including your budget and your level of comfort with technology? Here are some pros and cons of subscription antivirus programs to help you make a decision:</p>
<h3>PROS:</h3>
<h5>1. You get comprehensive protection.</h5>
<p>When you subscribe to an antivirus program, you can be confident that you’re getting comprehensive protection against all types of malware, including viruses, Trojans, worms, spyware, and adware. This is in contrast to free antivirus programs, which may only offer basic protection against viruses.</p>
<h5>2. You get regular updates.</h5>
<p>One of the biggest advantages of subscription antivirus programs is that they automatically update their virus definitions on a regular basis. This means that you’ll always be protected against the latest threats, even if you don’t have time to manually update your program yourself. Free antivirus programs typically don’t offer this automatic updating feature.</p>
<h5>3. You get expert support.</h5>
<p>Another advantage of subscription antivirus programs is that they usually come with access to expert support staff who can help you if you run into any problems using the software or dealing with malware infections. Free antivirus programs typically don’t offer this kind of support.</p>
<h3>CONS:</h3>
<h5>1. They can be expensive.</h5>
<p>One downside of subscription antivirus programs is that they can be relatively expensive</p>
<h2>What is the Best Antivirus for you?</h2>
<p>There are many different types of antivirus software on the market, and it can be difficult to determine which one is right for you. Some factors to consider include your budget, the level of protection you need, and whether you want a subscription-based or free program.</p>
<p>If you’re looking for a free antivirus program, Avast Free Antivirus and AVG AntiVirus Free are both excellent options. However, if you’re willing to pay for a subscription, Norton Security Deluxe provides more comprehensive protection against malware and other online threats.</p>
<p>Ultimately, the best antivirus program for you will depend on your individual needs and preferences. Be sure to do your research before making a decision, as there are many great options available.</p>
<h2>Conclusion</h2>
<p>There are many different factors to consider when choosing an antivirus program, but ultimately it boils down to personal preference. Some people prefer free programs because they don’t want to have to worry about paying for a subscription, while others feel that subscription programs offer better protection. Whichever route you choose, be sure to do your research so that you can select the best option for your needs.</p>
<h2>Contact KP Computer for help</h2>
<p>If you are looking for help with your computer, you can contact Kp computer for help. Kp computer is a computer support and services company that can help you with any computer problem you may have. They offer support for both Windows and Mac computers and can help you with any software or hardware issue you may be having. They also offer a variety of other services, such as data recovery, virus removal, and more.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://kpcomputer.tekzini.com/free-or-subscription-antivirus-which-is-the-best-one/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber-Attack Warning: Why you should NEVER skip software updates</title>
		<link>https://kpcomputer.tekzini.com/cyber-attack-warning-why-you-should-never-skip-software-updates/</link>
					<comments>https://kpcomputer.tekzini.com/cyber-attack-warning-why-you-should-never-skip-software-updates/#respond</comments>
		
		<dc:creator><![CDATA[kp@admin]]></dc:creator>
		<pubDate>Wed, 26 Aug 2020 07:52:46 +0000</pubDate>
				<category><![CDATA[Cyber security]]></category>
		<guid isPermaLink="false">https://kpcomputer.tekzini.com/?p=4494</guid>

					<description><![CDATA[Have you ever been guilty of snoozing those update notifications that appear on your PC? Unless you’re all set to auto-install, which many users aren’t, there’s every possibility you’ve put off vital updates because those notifications have appeared at an inopportune moment when you’re right in the middle of something urgent. But the truth is, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Have you ever been guilty of snoozing those update notifications that appear on your PC? Unless you’re all set to auto-install, which many users aren’t, there’s every possibility you’ve put off vital updates because those notifications have appeared at an inopportune moment when you’re right in the middle of something urgent. But the truth is, if there’s an update pending, it’s usually of vital importance. There is a reason for it, and it’s not there to be ignored.</p>
<h2>What are software and system updates?</h2>
<p>Updates perform a variety of tasks. Some are specific to particular software applications, whilst others are for our operating systems. There are updates that sweep up features that are out of date, whilst others install new and improved ones for improved efficiency and added functionality. Some updates put new drivers in place, whilst others fix frustrating bugs. But perhaps the most important updates are the ones that handle security flaws.</p>
<h2>What are security flaws?</h2>
<p>Security flaws are vulnerabilities in the integrity of an operating system or software application. Hackers know just how to exploit these vulnerabilities. They do this using malware, a type of code that’s installed on your PC when you click on a link or download something.</p>
<p>Once malware has infected your PC, it has the ability to compromise data, take control of your PC or use software differently to how it should be.</p>
<p>A particularly dangerous form of malware is ransomware. Ransomware has the ability to encrypt a victim’s files, rendering data inaccessible. The attacker then demands a ransom from the victim in exchange for restoring the data. Sometimes this ransom can be significant, often millions of pounds. The threat made is that failure to pay will result in systems being deleted and data sold online.</p>
<p>Malware and ransomware most often originate from phishing scams, emails prompting recipients to open an attachment or click on a link. Once downloaded or clicked, the malware is installed, taking over the PC.</p>
<p>Some forms of ransomware are particularly aggressive, infecting computers without the need to deceive users in this way. One such security vulnerability is <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708" target="_blank" rel="noopener noreferrer">BlueKeep</a>, discovered in May 2019 to be affecting older versions of Microsoft Windows.</p>
<p>As soon as the BlueKeep threat was uncovered, Microsoft urged in the region of a million users to apply a security update. The warning was reinforced by the UK National Cyber Security Centre and the US National Security Agency. The trouble was that users running Windows 2003 or Windows XP would not have automatically received the updates, as those operating systems were ‘out of support’. We’ll take a look at the risk that poses a bit later on.</p>
<h2>Why should I install software updates?</h2>
<p>Once an update is released, hackers everywhere become aware there is a security flaw ready to compromise. As fast as software developers are devising methods to stop security attacks, so hackers are finding new routes in.</p>
<p>Your data and files remain at risk unless you have installed the latest updates. Everything you store digitally: images, videos, files and databases may all be potentially exposed to hackers.</p>
<p>Some strains of malware are able to totally wipe documents from a hard drive, or copy them to a remote server. The WannaCry epidemic that hit in 2017 will remain on people’s minds for some time. Huge amounts of personal data and documents were held hostage. In many cases, the compromised systems had not been kept up to date.</p>
<p>Keeping operating systems and software updated is vital if you want to avoid threats like these.</p>
<h2>What does ‘out of support’ mean?</h2>
<p>Microsoft only provides support for operating systems and software applications for a limited timeframe.</p>
<p>Support for Windows 7 for example came to an end on 14th January 2020. After this date, anyone running this operating system stopped receiving software or security updates, bug fixes or technical support. As a result, users became susceptible to a range of cyber threats, including malware and ransomware.</p>
<p>The recommendation by Microsoft is to upgrade to the latest version of Windows, or subscribe to Extended Security Updates.</p>
<p>In addition, from 13th October 2020, support for Office 2010 will come to an end. After this date, Microsoft will no longer provide technical support, security patches or bug fixes for its Office suite of products, such as Word, Excel and Outlook. This includes security updates that could protect a PC from viruses and malware. Software updates via Microsoft Update will also cease, there will be no more technical support, and most online help content will be retired.</p>
<p>The risk here is that there will be a heightened chance that malicious third parties will have discovered and exploited any security vulnerabilities, especially as more time passes. This could expose your files, users and potentially data to considerable cyber-security risks.</p>
<p>If your business is still using Office 2010 in any capacity, this is the ideal opportunity to switch to <a href="https://kpcomputer.co.uk/service/office-365-business-solutions/">Microsoft 365</a>. Not only will you unlock many new features and apps, you’ll also be protecting your business from security vulnerabilities.</p>
<h2>Why update legacy systems?</h2>
<p>Does your organisation still use legacy infrastructure, perhaps because a move to a modern system would involve a great deal of upheaval and cost?</p>
<p>The downside of using such systems is that, apart from lowered productivity, the exposure to cyber-security risks is worryingly high. Microsoft says that Windows XP for example is six times more likely to be infected with malware than more recent versions of Windows. Certain legacy systems can’t be security patched, or no patches are available at all.</p>
<p>Such risks have the potential for reputational damage, lowered profitability and reduced competitive edge. Legacy systems are also subject to costly maintenance. Upgrading is therefore the wisest option.</p>
<h2>Stay up to date, stay safe</h2>
<p>The importance of keeping your systems updated with all the latest operational and security patches cannot be stressed enough.</p>
<p>Switching on automatic Windows security updates is the best way to stay safe. Upgrading to the latest versions of an operating system and software will also ensure you have the best possible chance of reducing your business risk.</p>
<p>Ready to make the switch to Microsoft 365, or to move your legacy infrastructure to a modern system? <a href="https://kpcomputer.co.uk/contacts/">Talk to KP Computer</a>. We’ll assess your individual IT requirements, and then devise a solution that will serve you well into the future, keeping your systems and data as secure as possible.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://kpcomputer.tekzini.com/cyber-attack-warning-why-you-should-never-skip-software-updates/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Is Your Smart Home a Safe Home? The Cyber-Security Dangers of Connected Devices.</title>
		<link>https://kpcomputer.tekzini.com/is-your-smart-home-a-safe-home-the-cyber-security-dangers-of-connected-devices/</link>
					<comments>https://kpcomputer.tekzini.com/is-your-smart-home-a-safe-home-the-cyber-security-dangers-of-connected-devices/#respond</comments>
		
		<dc:creator><![CDATA[kp@admin]]></dc:creator>
		<pubDate>Sun, 26 Jul 2020 07:55:25 +0000</pubDate>
				<category><![CDATA[Cyber security]]></category>
		<guid isPermaLink="false">https://kpcomputer.tekzini.com/?p=4497</guid>

					<description><![CDATA[There is little these days that can’t be controlled from your smart phone or through a voice assistant. From heating and home security, to appliances, lighting and even connected electronic toothbrushes, the Internet of Things (IoT) has very much installed itself in our homes courtesy of an array of internet-enabled devices. All very convenient for [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>There is little these days that can’t be controlled from your smart phone or through a voice assistant. From heating and home security, to appliances, lighting and even connected electronic toothbrushes, the Internet of Things (IoT) has very much installed itself in our homes courtesy of an array of internet-enabled devices. All very convenient for the on-the-go lifestyles of today. But have we taken a moment to consider how cyber-secure this new smart home technology is?</p>
<p>According to security experts, not enough thought is being given to the security of the devices that control our homes. One such expert, Mikko Hypponen, chief research officer for Finland-based F-Secure, a digital security company, says that <em>‘if it’s smart, it’s also vulnerable’</em>, warning that the more connectivity we furnish our lives with, the greater degree of vulnerability we create for ourselves.</p>
<h2>What are the risks with IoT devices?</h2>
<p>The main risk with smart home devices is that they can provide an in-road into home networks, allowing hackers to find their way into smartphones, computers and other devices. This in turn gets criminals a front row seat when it comes to viewing sensitive information, from credit cards details to all manner of account passwords.</p>
<p>Some of the weakest smart devices on a network are home appliances, such as fridge freezers and doorbell cameras. The big problem is that users rarely change the default password. This allows hackers to easily compromise a network, finding their way into other devices such as home computers and smartphones, opening malicious websites, launching spyware and creating spam emails, social posts and text messages. They can also suppress alarms, sensors and security cameras, rending properties at risk of intrusion.</p>
<p>What’s more, when voice assistants such as the Amazon Echo and Google Home are linked in to a smart home set-up, there is the added risk of attackers being able to open a door to a property, allowing intruders inside.</p>
<p>This problem has become so widespread that a surge in ransomware attacks has resulted. This is where hackers render devices inaccessible until the user gives in to their demand for a large sum of money. Remember Wannacry that brought NHS IT systems down in massive proportions in 2017? That was what was known as a Distributed Denial of Service (DDoS) attack. So you can see the potential here is very, very serious.</p>
<h2>How to protect smart home devices from cyber-attacks?</h2>
<p>There are a number of steps you can take to secure your smart home devices.</p>
<h3>1. Secure your WiFi network</h3>
<p>You can strengthen the security of your WiFi network by changing the network name, by using WPA2 encryption, by setting a secure password and by keeping the firmware up to date.</p>
<ul>
<li>Default WiFi network names give away the make and model of the router, which makes it easier for hackers to identify security flaws. This is why changing the network name will help to secure it.</li>
<li>WPA2 (Wi-Fi Protected Access 2) is a network security technology used on wireless networks. When enabled with its strongest encryption option, anyone within range of the network might be able to view the traffic, but it will be encrypted so that any passwords or financial information won’t be readable.</li>
<li>Password wise, it’s vital to follow best practice. Machine generated passwords are best according to the Government’s <a href="https://www.ncsc.gov.uk/collection/passwords/updating-your-approach" target="_blank" rel="noopener noreferrer">National Cyber Security Centre</a>. These passwords are random and unique and therefore more secure than anything a user will come up with themselves. They also take away the risk of a hacker working out a password using the likes of surnames and dates of birth, as well as some of the more obvious choices. Machine generated passwords may be more difficult to recall, but using them alongside a password manager will remove the memory issue. Here are some of the <a href="https://uk.pcmag.com/password-managers/4296/the-best-password-managers" target="_blank" rel="noopener noreferrer">best password managers for 2020</a>, or you can ask your KP Computer contact for advice.</li>
<li>Regarding firmware updates, some of the newer routers may have a firmware upgrade button which you can press and that’s everything done for you. Others will need you to go to the manufacturer’s website and download an update.</li>
</ul>
<h3>2. Secure your device</h3>
<p>Once you’ve secured your Wi-Fi network, it’s time to turn your attention to the smart device itself.</p>
<p>Again, change the default password to something secure. Next, look at disabling features such as Universal Plug and Play (UPnP). UPnP helps you connect devices to your network quickly, without any need for manual configuration needed. The trouble is, it can also provide an in-road into your network for hackers, allowing them to undertake malicious activities.</p>
<p>Lastly, be sure to keep your device up to date. When you see that a software or firmware update is available, be sure to download and install it. More often than not, these updates include vital patches designed to close security flaws.</p>
<h3>3. Switch off the always-on setting</h3>
<p>If you use a voice assistant, switching off the always-on setting, or simply hitting ‘mute’, will reduce the security risk. This will make it more of a task to talk to your assistant though, so the best advice is to switch off when you are not at home. If you’re going to be away for a while, unplug the device and secure it in a safe or locked cupboard.</p>
<h2>Need help securing your smart home?</h2>
<p>If you benefit from some expert help with securing your smart home and setting up your connected devices so they don’t present a host of security flaws, <a href="https://kpcomputer.co.uk/?page_id=201">talk to KP Computer</a>. We look forward to being of assistance.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://kpcomputer.tekzini.com/is-your-smart-home-a-safe-home-the-cyber-security-dangers-of-connected-devices/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Staff Working from Home? 5 Vital Cyber Security Considerations.</title>
		<link>https://kpcomputer.tekzini.com/staff-working-from-home-5-vital-cyber-security-considerations/</link>
					<comments>https://kpcomputer.tekzini.com/staff-working-from-home-5-vital-cyber-security-considerations/#respond</comments>
		
		<dc:creator><![CDATA[kp@admin]]></dc:creator>
		<pubDate>Tue, 30 Jun 2020 08:04:24 +0000</pubDate>
				<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[Remote working]]></category>
		<guid isPermaLink="false">https://kpcomputer.tekzini.com/?p=4504</guid>

					<description><![CDATA[Cyber security is a major consideration now much of the UK’s workforce is working from home in response to the coronavirus pandemic. Here we look at the common cyber threats associated with remote working, together with tips on how to keep your business safe whilst your staff work from home. Many companies offer flexible working, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Cyber security is a major consideration now much of the UK’s workforce is working from home in response to the coronavirus pandemic. Here we look at the common cyber threats associated with remote working, together with tips on how to keep your business safe whilst your staff work from home.</strong></p>
<p>Many companies offer flexible working, where staff work from home occasionally or some even full time. Even for those who don’t officially work from home, a lot will naturally login to keep track of work emails or finish off the odd task they couldn’t manage in the office.</p>
<p>Remote working to some degree was already a reality for many businesses, but never perhaps on such a scale as when the coronavirus outbreak took hold. This is likely why, as a general rollout of remote working started to become the norm, businesses found they were not really prepared for the cyber threats that would quickly pose a huge challenge.</p>
<h2>What are the cyber security threats associated with home working?</h2>
<p>The COVID-19 pandemic has led to a surge in phishing scams, many of them focusing on the uncertainty and fears surrounding the situation and taking advantage of people’s need to seek advice and reassurance on coronavirus related issues.</p>
<p>A recent report found there has been a <a href="https://www.infosecurity-magazine.com/news/covid19-drive-phishing-emails-667/" target="_blank" rel="noopener noreferrer">600% increase in reported phishing emails since the end of February</a>, with many of them taking advantage of the uncertainty surrounding the pandemic.</p>
<p>Emails were intercepted impersonating the World Health Organization, asking victims to download a ‘safety measure’ by clicking a link. They were then prompted to verify their email by entering login details. Other scam emails appeared to be from HMRC and the Health and Safety Executive, all designed to harvest sensitive data and login details so that accounts could be compromised and used for unscrupulous gain by cyber criminals.</p>
<p>Aside from phishing attacks, the simple act of staff logging in to a company network has also been posing a major risk.</p>
<p>When staff use remote desktop protocol (RDP) to login to a network, this can pose a significant risk of ransomware attacks. Unless multi-factor authentication (MFA) is used to login, any unsecured network can act as an open gateway to hackers.</p>
<h2>What is ransomware?</h2>
<p>Ransomware is a type of malware that encrypts a victim’s file, rendering data inaccessible. The attacker then demands a ransom from the victim in exchange for restoring the data. Ransomware often originates from phishing scams where attachments that appear trustworthy are emailed to a victim. Once downloaded and opened, they can take hold of the victim’s computer. Some of the more aggressive forms of ransomware exploit security holes in operating systems, infecting computers without the need to deceive users. An example of this is BlueKeep, discovered in May 2019 to be affecting older versions of Microsoft Windows.</p>
<p>So, now we know the cyber risks of working from home, it’s time to look at how to minimise them. How to protect your business and its data during the home working revolution? Here are our top tips.</p>
<h2>1. Set a remote working policy</h2>
<p>It’s vital to put a policy and guidance pack in place to manage the risks. Make staff aware of security protocol and you will be less likely to suffer a cyber breach. The policy should include:</p>
<ul style="margin-bottom: 1rem;">
<li>How to store devices securely when not in use</li>
<li>The importance of creating and maintaining robust passwords</li>
<li>Keeping software updated to the latest versions and installing security updates</li>
<li>Acceptable use policy for visiting non-work related websites</li>
<li>How to clear a browser cache to prevent login details being compromised</li>
<li>Use of company devices in public places</li>
<li>How to report the loss or theft of devices or a possible data compromise</li>
</ul>
<p>
It’s crucial that all staff are not only aware of threats to cyber-security, but also know how to deal with them.</p>
<h2>2. Set up multi-layer authentication</h2>
<p>Multi-factor authentication (MFA), also known as two-factor authentication, is a security enhancement that requires additional evidence to be entered before logging into an account. MFA helps prevent unauthorised access to the protected account should credentials become compromised.</p>
<p>According to Microsoft, <a href="https://www.microsoft.com/security/blog/2019/08/20/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks/" target="_blank" rel="noopener noreferrer">enabling MFA can reduce account compromise up to 99.9 percent</a>, bringing the chance of stolen credentials down to almost zero.</p>
<p>MFA adds additional account security that protects all employees from compromised credentials, protecting not only them, but also your business and its data too.</p>
<h2>3. Use a virtual private network (VPN)</h2>
<p>A VPN provides a secure, encrypted connection between your PC and an internet server. It is designed to prevent anyone from spying on what you’re doing, and also stops hackers getting in and seeing any data that you access over the connection.</p>
<p>A VPN is vital in regulated industries such as legal, finance and insurance, but is equally useful across any sector. Instead of allowing employees to access your company network via their own internet connection, the use of a VPN provides a secure in-road.</p>
<p>Here’s a list of the <a href="https://www.techadvisor.co.uk/test-centre/vpn/best-vpn-for-working-from-home-3785776/" target="_blank" rel="noopener noreferrer">best VPN services for working from home</a>, or just ask your KP Computer contact for advice.</p>
<h2>4. Provide company devices</h2>
<p>If you allow staff to work on their own devices, then you automatically lose control of cyber security. Devices used for social pastimes may well be susceptible to malware or viruses. How can you be sure your employees have installed decent firewalls and anti-virus software and are running regular scans?</p>
<p>Whilst it can be something of an investment, it is certainly a worthwhile one to know that staff are logging into your company network using devices that only connect through your VPN using multi-layer authentication. Devices that are installed with your company approved firewall and anti-virus and that are not used to browse unapproved websites.</p>
<h2>5. Use a password manager</h2>
<p>Cyber security experts suggest using a password manager. This is a platform that securely stores passwords and automatically fills them into login pages. They help protect all online accounts with a strong password. These are particularly useful if your staff are accessing various online platforms as part of their work, such as social media sites, client portals and content management systems.</p>
<p>The likes of <a href="https://www.lastpass.com/" target="_blank" rel="noopener noreferrer">LastPass</a>, <a href="https://bitwarden.com/" target="_blank" rel="noopener noreferrer">BitWarden</a>, <a href="https://www.dashlane.com/" target="_blank" rel="noopener noreferrer">Dashlane</a>, <a href="https://www.keepersecurity.com/" target="_blank" rel="noopener noreferrer">Keeper</a> and <a href="https://1password.com/" target="_blank" rel="noopener noreferrer">1Password</a> are good examples of password managers. Web browsers including Safari, Chrome and Firefox also have built-in password controls.</p>
<p>Some password managers have features that inform you when a site has experienced a data breach. Others can tell you if the password you’re using has been found in a stockpile of stolen user data, as at least <a href="https://haveibeenpwned.com/Passwords" target="_blank" rel="noopener noreferrer">555 million passwords</a> have. Password managers also can help you find weak or reused passwords.</p>
<h2>Need help with cyber security for your remote workforce? Talk to KP Computer.</h2>
<p>If you could use some professional help with setting up your remote workforce for secure working, <a href="https://kpcomputer.co.uk/?page_id=201">talk to the experts at KP Computer</a>. We’re here to help, and look forward to being of assistance.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://kpcomputer.tekzini.com/staff-working-from-home-5-vital-cyber-security-considerations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
