<p>With most of the world under lockdown over the coronavirus outbreak, many are restricted to stay at home and continue their work online.</p>.<p>However, it is imperative the employee takes proper measures so the system is secured for making video conference calls and also during the exchange of text-based emails that contain sensitive information such as trade secrets and financial credentials. Or else hackers can strike them and steal them before they can realise what hit them. </p>.<p>To help you develop good security practices, Vaidyanathan R Iyer, security software leader, IBM India (& South Asia), has shared a list of valuable tips with <em>Deccan Herald.</em></p>.<p>*Only use the tools provided by your organization to work remotely or you might be putting your employer at risk. If you don’t know what to use, consult your IT department for resources.</p>.<p>*Implement multi-factor authentication (MFA) where possible. This adds an extra security checkpoint such as confirming a login via password, or the use of biometrics like your fingerprint, in addition to a second checkpoint spanning a mobile or email confirmation.</p>.<p>Must read | <a href="https://www.deccanherald.com/specials/hackers-use-fake-coronavirus-heat-map-to-inject-pc-malware-813262.html" target="_blank">Hackers use fake coronavirus heat map to inject PC malware</a></p>.<p>*Ensure all of your devices are patched and backed up to eliminate vulnerabilities that can be taken advantage of by attackers.</p>.<p>*Be cautious of suspicious emails. Look at the 'from' email address, is it spelled correctly? Do you know the person that sent it to you? If not, don’t open the attachments or links, no matter how enticing it may be. Keep an eye out for spam using COVID-19 to spread fear and encourage you to click links or open malicious files.</p>.<p>*Update your home router with the latest firmware. If it’s been a while since you’ve found available updates and/or you’ve owned your router for a few years, it might be time for a new one.</p>.<p>*Use only trusted Wi-Fi connections, especially if you’re working at public locations like a coffee shop, and always stay connected to your company’s VPN when outside of your business network.</p>.<p>*Use free tools like Quad9 to protect against DNS-based attacks and block known malicious websites through the use of nearly 20 threat intelligence feeds.</p>.<p>Must read | <a href="https://www.deccanherald.com/specials/ransomware-alert-hackers-using-fake-coronavirus-tracker-app-to-lock-android-phones-814608.html" target="_blank">Ransomware alert: Hackers using fake coronavirus tracker app to lock Android phones</a></p>.<p>*Ensure you’re aware of your company’s incident response plan and that you know how to get in touch with your IT department remotely if you have an issue.</p>.<p>*Take advantage of the cloud when working remotely. Don’t download corporate files onto personal devices without proper authorization and management tools. </p>.<p>*If you’re using your personal devices for work, make sure to uses your company’s Mobile Device Management solution to ensure you’re staying secure and following device policies.</p>.<p>Also, <a data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__www.ibm.com_security%26d%3DDwMGaQ%26c%3DFtw_YSVcGmqQBvrGwAZugGylNRkk-uER0-5bY94tjsc%26r%3DJrWffNip5oGYIal0zbsS1vrAZguDKauJ-6vixWe8iy8%26m%3DRxqcNbSqbL0LuJv2ToWnaOyc-VsTS5nhkvN8JXubhn8%26s%3DaqTPCEAHFAG_RIeLNf2WIlrY8EF0saRuwLdE0K2TsdU%26e%3D&source=gmail&ust=1585992192499000&usg=AFQjCNHuSWfxnBx6nQ_eSQhr26ru236N2Q" href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ibm.com_security&d=DwMGaQ&c=Ftw_YSVcGmqQBvrGwAZugGylNRkk-uER0-5bY94tjsc&r=JrWffNip5oGYIal0zbsS1vrAZguDKauJ-6vixWe8iy8&m=RxqcNbSqbL0LuJv2ToWnaOyc-VsTS5nhkvN8JXubhn8&s=aqTPCEAHFAG_RIeLNf2WIlrY8EF0saRuwLdE0K2TsdU&e=" target="_blank">I<b>BM Security </b></a>is offering a number of solutions and extended, no-charge access to technologies to help clients alter their operations and security programs to <a data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__securityintelligence.com_posts_How-2Dwe-2Dlearned-2Dto-2Dstop-2Dworrying-2Dand-2Dembrace-2Dremote-2Dwork_%26d%3DDwMGaQ%26c%3DFtw_YSVcGmqQBvrGwAZugGylNRkk-uER0-5bY94tjsc%26r%3DJrWffNip5oGYIal0zbsS1vrAZguDKauJ-6vixWe8iy8%26m%3DRxqcNbSqbL0LuJv2ToWnaOyc-VsTS5nhkvN8JXubhn8%26s%3DunZvMk09mgnUlvDUk8VGuUicrKOD2Gxnyt5pBWbOHtU%26e%3D&source=gmail&ust=1585992192499000&usg=AFQjCNGS5TPkB4H4ReZBc50hZOxMjVLYpA" href="https://urldefense.proofpoint.com/v2/url?u=https-3A__securityintelligence.com_posts_How-2Dwe-2Dlearned-2Dto-2Dstop-2Dworrying-2Dand-2Dembrace-2Dremote-2Dwork_&d=DwMGaQ&c=Ftw_YSVcGmqQBvrGwAZugGylNRkk-uER0-5bY94tjsc&r=JrWffNip5oGYIal0zbsS1vrAZguDKauJ-6vixWe8iy8&m=RxqcNbSqbL0LuJv2ToWnaOyc-VsTS5nhkvN8JXubhn8&s=unZvMk09mgnUlvDUk8VGuUicrKOD2Gxnyt5pBWbOHtU&e=" target="_blank">protect remote employees</a>, <a data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__securityintelligence.com_posts_ibm-2Dx-2Dforce-2Dthreat-2Dintelligence-2Dcybersecurity-2Dbrief-2Dnovel-2Dcoronavirus-2Dcovid-2D19_%26d%3DDwMGaQ%26c%3DFtw_YSVcGmqQBvrGwAZugGylNRkk-uER0-5bY94tjsc%26r%3DJrWffNip5oGYIal0zbsS1vrAZguDKauJ-6vixWe8iy8%26m%3DRxqcNbSqbL0LuJv2ToWnaOyc-VsTS5nhkvN8JXubhn8%26s%3DAnF-wo0LCS9XVtWO0ojOIjdFxAYh6PVv0kjnsggI8Ks%26e%3D&source=gmail&ust=1585992192499000&usg=AFQjCNHgcKtP5Y3lmat6wP_zQShvB8_bOw" href="https://urldefense.proofpoint.com/v2/url?u=https-3A__securityintelligence.com_posts_ibm-2Dx-2Dforce-2Dthreat-2Dintelligence-2Dcybersecurity-2Dbrief-2Dnovel-2Dcoronavirus-2Dcovid-2D19_&d=DwMGaQ&c=Ftw_YSVcGmqQBvrGwAZugGylNRkk-uER0-5bY94tjsc&r=JrWffNip5oGYIal0zbsS1vrAZguDKauJ-6vixWe8iy8&m=RxqcNbSqbL0LuJv2ToWnaOyc-VsTS5nhkvN8JXubhn8&s=AnF-wo0LCS9XVtWO0ojOIjdFxAYh6PVv0kjnsggI8Ks&e=" target="_blank">protect themselves from cybersecurity criminals</a> capitalizing on COVID-19 uncertainty, and address critical security needs.</p>.<p><em>Get the latest news on new launches, gadget reviews, apps, cyber security and more on personal technology only on <a href="https://www.deccanherald.com/tag/dh-tech" target="_blank">DH Tech</a>.</em> </p>
<p>With most of the world under lockdown over the coronavirus outbreak, many are restricted to stay at home and continue their work online.</p>.<p>However, it is imperative the employee takes proper measures so the system is secured for making video conference calls and also during the exchange of text-based emails that contain sensitive information such as trade secrets and financial credentials. Or else hackers can strike them and steal them before they can realise what hit them. </p>.<p>To help you develop good security practices, Vaidyanathan R Iyer, security software leader, IBM India (& South Asia), has shared a list of valuable tips with <em>Deccan Herald.</em></p>.<p>*Only use the tools provided by your organization to work remotely or you might be putting your employer at risk. If you don’t know what to use, consult your IT department for resources.</p>.<p>*Implement multi-factor authentication (MFA) where possible. This adds an extra security checkpoint such as confirming a login via password, or the use of biometrics like your fingerprint, in addition to a second checkpoint spanning a mobile or email confirmation.</p>.<p>Must read | <a href="https://www.deccanherald.com/specials/hackers-use-fake-coronavirus-heat-map-to-inject-pc-malware-813262.html" target="_blank">Hackers use fake coronavirus heat map to inject PC malware</a></p>.<p>*Ensure all of your devices are patched and backed up to eliminate vulnerabilities that can be taken advantage of by attackers.</p>.<p>*Be cautious of suspicious emails. Look at the 'from' email address, is it spelled correctly? Do you know the person that sent it to you? If not, don’t open the attachments or links, no matter how enticing it may be. Keep an eye out for spam using COVID-19 to spread fear and encourage you to click links or open malicious files.</p>.<p>*Update your home router with the latest firmware. If it’s been a while since you’ve found available updates and/or you’ve owned your router for a few years, it might be time for a new one.</p>.<p>*Use only trusted Wi-Fi connections, especially if you’re working at public locations like a coffee shop, and always stay connected to your company’s VPN when outside of your business network.</p>.<p>*Use free tools like Quad9 to protect against DNS-based attacks and block known malicious websites through the use of nearly 20 threat intelligence feeds.</p>.<p>Must read | <a href="https://www.deccanherald.com/specials/ransomware-alert-hackers-using-fake-coronavirus-tracker-app-to-lock-android-phones-814608.html" target="_blank">Ransomware alert: Hackers using fake coronavirus tracker app to lock Android phones</a></p>.<p>*Ensure you’re aware of your company’s incident response plan and that you know how to get in touch with your IT department remotely if you have an issue.</p>.<p>*Take advantage of the cloud when working remotely. Don’t download corporate files onto personal devices without proper authorization and management tools. </p>.<p>*If you’re using your personal devices for work, make sure to uses your company’s Mobile Device Management solution to ensure you’re staying secure and following device policies.</p>.<p>Also, <a data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__www.ibm.com_security%26d%3DDwMGaQ%26c%3DFtw_YSVcGmqQBvrGwAZugGylNRkk-uER0-5bY94tjsc%26r%3DJrWffNip5oGYIal0zbsS1vrAZguDKauJ-6vixWe8iy8%26m%3DRxqcNbSqbL0LuJv2ToWnaOyc-VsTS5nhkvN8JXubhn8%26s%3DaqTPCEAHFAG_RIeLNf2WIlrY8EF0saRuwLdE0K2TsdU%26e%3D&source=gmail&ust=1585992192499000&usg=AFQjCNHuSWfxnBx6nQ_eSQhr26ru236N2Q" href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ibm.com_security&d=DwMGaQ&c=Ftw_YSVcGmqQBvrGwAZugGylNRkk-uER0-5bY94tjsc&r=JrWffNip5oGYIal0zbsS1vrAZguDKauJ-6vixWe8iy8&m=RxqcNbSqbL0LuJv2ToWnaOyc-VsTS5nhkvN8JXubhn8&s=aqTPCEAHFAG_RIeLNf2WIlrY8EF0saRuwLdE0K2TsdU&e=" target="_blank">I<b>BM Security </b></a>is offering a number of solutions and extended, no-charge access to technologies to help clients alter their operations and security programs to <a data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__securityintelligence.com_posts_How-2Dwe-2Dlearned-2Dto-2Dstop-2Dworrying-2Dand-2Dembrace-2Dremote-2Dwork_%26d%3DDwMGaQ%26c%3DFtw_YSVcGmqQBvrGwAZugGylNRkk-uER0-5bY94tjsc%26r%3DJrWffNip5oGYIal0zbsS1vrAZguDKauJ-6vixWe8iy8%26m%3DRxqcNbSqbL0LuJv2ToWnaOyc-VsTS5nhkvN8JXubhn8%26s%3DunZvMk09mgnUlvDUk8VGuUicrKOD2Gxnyt5pBWbOHtU%26e%3D&source=gmail&ust=1585992192499000&usg=AFQjCNGS5TPkB4H4ReZBc50hZOxMjVLYpA" href="https://urldefense.proofpoint.com/v2/url?u=https-3A__securityintelligence.com_posts_How-2Dwe-2Dlearned-2Dto-2Dstop-2Dworrying-2Dand-2Dembrace-2Dremote-2Dwork_&d=DwMGaQ&c=Ftw_YSVcGmqQBvrGwAZugGylNRkk-uER0-5bY94tjsc&r=JrWffNip5oGYIal0zbsS1vrAZguDKauJ-6vixWe8iy8&m=RxqcNbSqbL0LuJv2ToWnaOyc-VsTS5nhkvN8JXubhn8&s=unZvMk09mgnUlvDUk8VGuUicrKOD2Gxnyt5pBWbOHtU&e=" target="_blank">protect remote employees</a>, <a data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__securityintelligence.com_posts_ibm-2Dx-2Dforce-2Dthreat-2Dintelligence-2Dcybersecurity-2Dbrief-2Dnovel-2Dcoronavirus-2Dcovid-2D19_%26d%3DDwMGaQ%26c%3DFtw_YSVcGmqQBvrGwAZugGylNRkk-uER0-5bY94tjsc%26r%3DJrWffNip5oGYIal0zbsS1vrAZguDKauJ-6vixWe8iy8%26m%3DRxqcNbSqbL0LuJv2ToWnaOyc-VsTS5nhkvN8JXubhn8%26s%3DAnF-wo0LCS9XVtWO0ojOIjdFxAYh6PVv0kjnsggI8Ks%26e%3D&source=gmail&ust=1585992192499000&usg=AFQjCNHgcKtP5Y3lmat6wP_zQShvB8_bOw" href="https://urldefense.proofpoint.com/v2/url?u=https-3A__securityintelligence.com_posts_ibm-2Dx-2Dforce-2Dthreat-2Dintelligence-2Dcybersecurity-2Dbrief-2Dnovel-2Dcoronavirus-2Dcovid-2D19_&d=DwMGaQ&c=Ftw_YSVcGmqQBvrGwAZugGylNRkk-uER0-5bY94tjsc&r=JrWffNip5oGYIal0zbsS1vrAZguDKauJ-6vixWe8iy8&m=RxqcNbSqbL0LuJv2ToWnaOyc-VsTS5nhkvN8JXubhn8&s=AnF-wo0LCS9XVtWO0ojOIjdFxAYh6PVv0kjnsggI8Ks&e=" target="_blank">protect themselves from cybersecurity criminals</a> capitalizing on COVID-19 uncertainty, and address critical security needs.</p>.<p><em>Get the latest news on new launches, gadget reviews, apps, cyber security and more on personal technology only on <a href="https://www.deccanherald.com/tag/dh-tech" target="_blank">DH Tech</a>.</em> </p>