{"id":68,"date":"2015-10-20T14:14:20","date_gmt":"2015-10-20T18:14:20","guid":{"rendered":"http:\/\/blogs.uml.edu\/information-security\/?p=68"},"modified":"2015-10-22T16:14:04","modified_gmt":"2015-10-22T20:14:04","slug":"how-to-create-a-cyber-secure-home","status":"publish","type":"post","link":"https:\/\/blogs.uml.edu\/information-security\/2015\/10\/20\/how-to-create-a-cyber-secure-home\/","title":{"rendered":"How To Create a Cyber Secure Home"},"content":{"rendered":"<p>Most homes\u00a0have devices linked to their\u00a0wireless networks, including computers, laptops, gaming devices, TVs, tablets, and smartphones that access the Internet. To protect your home network and your family, you need to have the right tools in place and confidence that you and your family members can use the Internet safely and securely.<\/p>\n<p><strong><strong>Secure Your Computers \/ Devices<\/strong><\/strong><\/p>\n<p>The first step is to keep a clean machine and make sure all of your Internet-enabled devices have the latest operating system, web browsers and security software. These are the best defenses against viruses, malware, and other online threats.\u00a0 This includes mobile devices that access your wireless network.\u00a0 Whenever possible, enable automatic updating.<\/p>\n<p>If possible, have two computers at home: one for parents and one for the children.\u00a0 If you are sharing one computer, make sure you have separate accounts for everyone and the children do not have privileged (administrative) access.<\/p>\n<p><strong><strong>Secure Yourself<\/strong><\/strong><\/p>\n<p>Cyber attackers have learned years ago that the best way to get something is simply to ask for it. Use your common sense as your best defense.\u00a0 If a message seems odd, suspicious, or too good to be true, it may be an attack.\u00a0\u00a0 Examples:<\/p>\n<p>Someone calls your pretending to be Microsoft tech support. They claim your computer is infected and would like remote access to your computer to \u201cfix\u201d it, or want you to purchase their fake anti-virus software.<\/p>\n<p>\u201cPhishing\u201d emails are very convincing and are designed to fool you into opening an infected attachment or clicking on a malicious link. These emails may appear to come from a friend or organization you know.\u00a0\u00a0If you are not sure or something just doesn\u2019t look right, call the user or company using a phone number you know to be valid and legitimate.\u00a0 With the explosion of social media, cyber criminals may even use details from your social media accounts to craft a customized message.<\/p>\n<p><strong><strong>Secure Your Home Network<\/strong><\/strong><\/p>\n<p>A wireless network means connecting an Internet access point \u2013 such as a cable modem \u2013 to a wireless router. Going wireless is a convenient way to allow multiple devices to connect to the Internet from different areas of your home. However, unless you secure your router, you\u2019re vulnerable to people accessing information on your computer, using your Internet service for free and potentially using your network to commit cyber crimes.<\/p>\n<ul>\n<li>Change the name of your router: The default ID &#8211; called a &#8220;service set identifier\u201d (SSID) is assigned by the manufacturer. Change your router to a name that is unique to you and won\u2019t be easily guessed by others.<\/li>\n<li>Change the pre-set password on your router: When creating a new password, make sure it is long and strong, using a mix of numbers, letters and symbols.\u00a0 Be careful with whom you share this password.<\/li>\n<li>Configure your Wi-Fi network so that if anyone wants to join it, they must use the password.\u00a0 Additionally, always configure your router to use the latest encryption, which is currently WPA2.<\/li>\n<li>Be aware of all the devices connected to your home network, including baby monitors, gaming consoles, sound systems, TVs, and smartphones.\u00a0\u00a0 They all can be used as attack vectors into your homes.\u00a0 Make sure that they are running the latest versions of the software (sometimes called firmware) on them, downloadable from the manufacturer.<\/li>\n<li>If connecting to UMass Lowell resources (i.e. servers, network file shares, you must use the campus VPN solution (https:\/\/vpn.uml.edu) to encrypt the traffic from your home device to the UMass Lowell network.<\/li>\n<\/ul>\n<p><strong><strong>Secure your Accounts<\/strong><\/strong><\/p>\n<p>Like most people, you probably have many accounts online and on your devices and computers. Here are some simple steps to protect them:<\/p>\n<ul>\n<li>Always use strong passwords that are hard to guess.\u00a0 If possible, use passphrases such as \u201cRedSoxAreTheBest!\u201d<\/li>\n<li>Use different passwords for each of your accounts and devices.\u00a0 If you have too many accounts and too many passwords, use a password manager to securely store them.\u00a0 These are applications that securely store all of your passwords in an encrypted vault.<\/li>\n<li>Use a two-step verification whenever possible.\u00a0 This is also called 2 Factor Authentication (2FA).\u00a0 This uses a password and something else to log into your account such as a code sent to your smartphone.\u00a0 Banks have been using this for a few years now.<\/li>\n<li>On social media sites, post only what you want the public to see.\u00a0 Assume anything you post will eventually be seen by your neighbors, strangers, or even your management.<\/li>\n<\/ul>\n<p><strong><strong>Have You Been Hacked?<\/strong><\/strong><\/p>\n<p>No matter how secure you are, sooner or later you may become a victim of an online crime or even hacked. Here are some tips:<\/p>\n<ul>\n<li>Create regular backups of all your personal information.\u00a0 If your computer or mobile device is hacked, the only way you can recover all of your personal information may be from backups.<\/li>\n<li>If one of your online accounts have been hacked, immediately log in and change your password to something strong and unique.\u00a0 If you no longer have access, contact the company.\u00a0 If you use that same password on other accounts, change it on those too.<\/li>\n<li>Monitor all of your credit cards.\u00a0 If you see any charges you do not recognize, contact the credit card company right away and consider \u201cfreezing\u201d your credit.<\/li>\n<li>When banking and shopping, check to be sure the sites is security enabled. Look for web addresses with \u201chttps:\/\/\u201d which means the site takes extra measures to help secure your information. \u201chttp:\/\/\u201d is not secure.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Most homes\u00a0have devices linked to their\u00a0wireless networks, including computers, laptops, gaming devices, TVs, tablets, and smartphones that access the Internet. To protect your home network and your family, you need to have the right tools in place and confidence that &hellip; <a href=\"https:\/\/blogs.uml.edu\/information-security\/2015\/10\/20\/how-to-create-a-cyber-secure-home\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":273,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/68"}],"collection":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/users\/273"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/comments?post=68"}],"version-history":[{"count":12,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/68\/revisions"}],"predecessor-version":[{"id":82,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/68\/revisions\/82"}],"wp:attachment":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/media?parent=68"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/categories?post=68"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/tags?post=68"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}