Thursday, May 26, 2022
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • How-Tos
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • Video
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • How-Tos
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • Video
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Opinion > Alibaba Cloud Expert: Simple security tips for those working from home

Alibaba Cloud Expert: Simple security tips for those working from home

The UAE is slowly opening up its economy by easing quarantine protocols across the country.

Yuriy Yuzifovich by Yuriy Yuzifovich
September 10, 2020
in Opinion
3 min read
0 0
2
Alibaba Cloud Expert: Simple security tips for those working from home
1
SHARES
47
VIEWS
Share on FacebookShare on TwitterShare on EmailFollow on Google News

Recently, His Highness Sheikh Mohammed bin Rashid Al Maktoum, Vice President, Prime Minister and Ruler of Dubai, gave instructions to develop a national strategy for the post-COVID-19 era. His Highness called on the ministers, undersecretaries, members of the executive councils, and experts to collaborate to produce the strategy and establish short-term and long-term policies to reactivate the economic activities in the country.

Table of Contents

  • Keeping business-critical information secure
  • Run updates frequently
  • Be skeptical with every URL you click
  • Protect your video conferences

Keeping business-critical information secure

A  good number of sectors have restarted operations, however, the government still encourages employers to continue implementing health and safety measures such as social distancing, lessening the need for travel, and the implementation of a work-from-home (WFH) set-up.

Yuriy Yuzifovich, Head of Security Innovation Labs, Alibaba Cloud
Yuriy Yuzifovich, Head of Security Innovation Labs, Alibaba Cloud

WFH will likely have a long-term impact on the way people work and collaborate even after the pandemic because of its many benefits. It has enabled businesses to maintain lower running costs, with some moving to smaller spaces to accommodate the few office-bound people. WFH also provides greater flexibility for workers.

Of course, WFH does have some drawbacks such as technical challenges, particularly in the area of online security. This is a critical concern for businesses now pursuing a WFH model. While large enterprises have in-house security experts and policies to help ensure security remains top-notch, SMEs and their employees may need some help. With more businesses adopting the cloud, users have to be extra vigilant in protecting data and know what to do when faced with suspicious activity meant to steal their information.

Here are some steps SMEs can take to ensure that their business-critical information is kept secure even while implementing the WFH setup:

Run updates frequently

All home electronic devices should be maintained in an updated firmware state and all security patches need to be applied quickly. Many IoT devices such as home cameras, routers, and smart appliances present easy targets for hackers. Many inexpensive devices purchased several years ago no longer receive firmware updates from manufacturers that have switched their resources to support newer releases.

Such IoT devices should be discarded through a proper and responsible recycling method. Routers, in particular, present a serious potential threat as hackers can control the traffic going through the routers and implement various strategies to attack home users. DNS hijacking, for example, redirects users attempting to go to banking websites to phishing destinations that look exactly like the attacked bank’s login page. Updated firmware, therefore, can significantly limit the success of such cybersecurity threats.

Be skeptical with every URL you click

Phishing, in general, has increased since everyone started staying at home. Users need to be extra careful when clicking on links in emails and social media messages. Without the option to approach the sender of the link in person to verify its authenticity, users may fall victim to fraudsters pretending that the email is coming from another employee. The fraudster may then ask for a wire transfer or ask users to open an attached invoice where the attachment is malware. This type of phishing is called “whaling phishing.”

The most important requests should always be verified by an independent communication channel such as a phone call. While technical protections are important, social engineering attacks are as popular as ever, with humans still being the weakest link. Hackers often trick users into downloading software with embedded malware.

Crafty attacks can ask employees to download malware camouflaged or embedded as a teleconferencing software or a game. Users then should never execute updates and downloads from links sent through emails or pop-ups, but instead, download any updates or new installs from official locations or online app stores.

Protect your video conferences

With most team meetings now happening through video conferences, it is important to have passwords to limit the conference to only the intended audience. This will protect businesses against fraudsters eavesdropping on corporate meetings. A passcode can be used for connecting from both a computer and a phone. It’s a minor inconvenience but a worthwhile one for ensuring the privacy of the team’s meeting.

When WFH becomes the new normal for many companies – including SMEs – it is important that users always stay cautious in the digital realm by doing simple things: set up and update passwords on a regular basis, update firmware and always go to an official site for new installs. It is our responsibility to stay alert as we, large enterprises and SMEs, collectively adapt to the new normal in the post-pandemic world.

Tags: Alibaba Cloud
Share1TweetSendShare
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy
Previous Post

Citrix to appoint new area VP for emerging markets

Next Post

Loopia chooses EcoDataCenter

Yuriy Yuzifovich

Yuriy Yuzifovich

Alibaba Cloud Head of Security Innovation Labs, Yuriy is a technology and space enthusiast. Entrepreneur. Proud dad of three.

Related News

Intentional user-unfriendly interfaces of popular services

Intentional user-unfriendly interfaces of popular services

May 21, 2022 1:00 pm

What is Windows 365? Why does it matter?

April 30, 2022 5:00 pm
We went too far in 3D graphics; now we are going back

We went too far in 3D graphics; now we are going back

April 9, 2022 1:00 pm
The importance of cybersecurity in a cyber warfare era

The importance of cybersecurity in a cyber warfare era

February 26, 2022 8:00 pm
Next Post
Loopia chooses EcoDataCenter

Loopia chooses EcoDataCenter

Comments 2

  1. guciRek says:
    2 years ago

    Hello again :). Can we talk about covid? I am of the opinion that this is not a pandemic. And you? Greetings 🙂 Guci

    Reply
    • Atalay Kelestemur says:
      2 years ago

      Hello Guci,
      Could you please tell us why do you think Covid-19 is not a pandemic?

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Editor's Choice

Interview with Igor Seletskiy on AlmaLinux

7 best hosting control panels

How to update Linux Kernel without rebooting?

7 best Linux mail servers for 2022

7 best cPanel alternatives for 2022

7 best Linux web browsers for 2022

cPanel Security: 7 steps to secure cPanel

7 best CentOS alternatives

7 best Linux server distros for 2022

How to scan your server for Log4j (Log4Shell) vulnerability

Best web hosting service providers

AlmaLinux 8.6 Stable is ready to download

Ubuntu 22.04 LTS is available for download. What is new?

Advertisement

Recent News

  • Samsung and Red Hat teaming up for next-generation memory software
  • Microsoft introduced open-source XDP for Windows
  • Nvidia has announced new hardware focusing on AI-enabled data centers
  • Ubuntu 22.04 LTS has received new kernel security updates
  • NGINX 1.22 is released

Our Latest Interview

Interview: Erez Barak, Vice President Observability of Sumo Logic
Interview

Interview: Erez Barak, Vice President Observability of Sumo Logic

by Atalay Kelestemur
November 25, 2021 3:23 am


Cloud7 News is a news source that publishes the latest news, industry news and exclusive interviews on web hosting, cloud computing, data center, cybersecurity and linux.

News Categories

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Blockchain

Our Free Modules

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2022, Cloud7 News. Latest Cloud Computing, Web Hosting, Data Center Industry and Tech News

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • How-Tos
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • Video
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2022, Cloud7 News. Latest Cloud Computing, Web Hosting, Data Center Industry and Tech News

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.