VirtualTeams_Toolkit_ENG

54 www.virtual-teams.eu 6.3. Best practices for security from hackers Working from home is a lifeline for businesses but on the other hand, it provides a chance for people with bad motives to identify flaws in individual behavior as well as weaknesses in an organization's IT infrastructure. By carrying out the task below you can help create a stronger barrier between your work at home and the morally wrong cyber hackers Keep Passwords Private: We tend to use the same password for everything. It's difficult to keep track of multiple passwords, but it's critical for your privacy to use distinct passwords for each account. Make your passwords difficult to decode as well. To ensure optimal security, use capital letters, digits, and characters in your password, and make it at least 10 characters long Protect Against Cross-Site Scripting Attack: Otherwise known as XSS attacks, hackers steal login credentials when users register into websites. Having a robust firewall is the best defense against these forms of attacks. Scan All Hard Drives: Before using an old USB or pen drive, scan it using a USB scanner to see if it contains any malware. Hackers have been known to "drop" USB devices at offices in the hopes that an unsuspecting employee will open them. This can result in the automated installation of hazardous malware on your device.

RkJQdWJsaXNoZXIy NzYwNDE=