SlideShare a Scribd company logo
Securing Devices at Home
Date: October 22, 2020
About Me – The Speaker
2
Rory Ebanks, M.Sc., B.Sc., CCISO, CEH, CHFI, ECSA ,
CND, CISSP, CCSP, CISM, CISA , CSX, AZ -900
Director Information Security Advisor y
Symptai Consulti ng Limite d
Focus Areas
3
1. Preparin g for Remote Work
2. Understand in g the Risks of working remote ly
3. Mitigati ng the Risks of working remote ly
4. Protect ing files and device s
5. Additional Tips
6. Q&A
Preparing for
Remote work
5
Is your business prepared to work from home?
• What are the services that are critical to your operations?
• What processes are important for the services to be effective?
• Who are the people that are important to the process and service?
• Can the services be offered remotely? (Cloud, VPN, Terminal Services, etc.)
• Do the employees have devices to access the services remotely and are these
company owned or personal devices?
• If they are personal devices, do they meet your organization’s minimum-
security requirements?
• Do the employees have adequate Internet access?
• If services are not in the cloud can your infrastructure support remote
connections?
• If remote services are new to your organization have you taken precautions to
ensure that your implementation does not expose your organization and its
information assets?
Understanding the
Risks of working
Remotely
7
Understanding the Risks
While there are many potential solutions to getting your organization up
to speed with security in this new reality, we should first understand
some of the common cyber-attacks being utilized today.
Social
Engineering
Malware
Remote
Service
Attacks
Brute Force
Attacks
8
Understanding the Risks
Social Engineering
• Malware is a malicious computer
program or software with the
intention to cause harm to a
computer or to retrieve information
from the computer.
Malware
Understanding the Risks
9
10https://www.youtube.com/watch?v=AhaXzdGfwtE&t=4s
• Remote service attacks are
where cyber criminals attempt to
identify and exploit any
remote services which may be in
use by an organization.
Remote Ser vic e Attacks
Understanding the Risks
11
Shodan - RDP
• Brute force attacks involve guessing
various usernames and password
combinations until the correct
combination is identified to access
any site or service protected by
passwords.
Brute Force Attacks
Understanding the Risks
13
Mitigating the Risks
of working Remotely
15
Mitigating the Risks
Two-factor
Authentication
(2FA)
Enabling multi-factor
authentication (MFA) is
a straightforward way to
ensure that the only
person who has access
to your account is you.
Least
Privilege
Use access control
limitations and grant
access to resources
only on a need to
know basis.
Strong
Passwords
A strong password must
have a minimum of 10
characters and consist of
a mixture of uppercase,
lowercase, numbers and
have special characters
(such as #, @, &).
VPN
If possible, require
the use of a secure
VPN to establish a
connection to the
resources.
Backup
All important files must
be backed
up regularly and stored s
eparately from the
system being backed up.
Protect files backed
up by encrypting these
files with a password.
16
Mitigating the Risks
Suspicious
emails
Avoid opening
suspicious emails or
attachments, do not
click on links in emails or
text messages which you
were not expecting or
comes from an unknown
sender.
Enable
Security
Tools
Configure anti-
malware or anti-virus
software and disk
encryption on all
laptops and mobile
devices.
Update
Keep all devices up to
date with the latest
system updates and
patches
Secure home
Wi-Fi
network
Change your home
Wi-Fi and the router
default password
Video
conference
securely
* Ensure there is no
sensitive information in
your work area or in
view of the camera.
* Use a headset when
conducting conference
meetings * password-
protect meetings
Protecting Files and
Devices
18
Protecting Files
• Use Disk Encryption
• Backup Files Regularly
• Encrypt Files with Strong Passwords
• Use File-Level and Share-Level Security
FR
19
Protecting Devices
• Use a Privacy Screen
• Set a strong BIOS Password
• Use Strong Passwords/Biometrics
• Install a “Find My Phone” Application
• Avoid Leaving Devices Unattended and Unsecured
FR
20
Protecting Devices
• Keep up-to-date with the latest software updates
• When connecting to untrusted wireless network, use a VPN to encrypt your session
• Ensure that the most up-to-date virus and malware protection products are installed
Additional Tips
22
Tips
• Lock your devices & lock your doors
• Shutdown your laptop, ideally once per week (not restart)
• Employee Security Awareness
• Zoom experience:
• Don’t use your unique Zoom ID for all meetings
• Use a password
• If you are the host of the meeting, use the Zoom waiting room.
• Upgrade to a paid/enterprise account.
Work From Home:
Risk Assessment Tool
https://www.symptai.com/tools
24
Any Questions?
Securing Devices at Home

More Related Content

PPTX
презентация1
PPTX
Security Basics
PPTX
What is network security and Types
PPTX
IT Security Presentation
PPTX
Introduction to Cybersecurity
PPTX
Endpoint Protection
PPTX
Network Security
PDF
Presentation on Network Security
презентация1
Security Basics
What is network security and Types
IT Security Presentation
Introduction to Cybersecurity
Endpoint Protection
Network Security
Presentation on Network Security

What's hot (19)

PDF
Cyber security-briefing-presentation
PPTX
The Importance of Cybersecurity in 2017
PDF
CNIT 123: Ch 1 Ethical Hacking Overview
PPTX
Network Security
PPT
Understanding the need for security measures
PPT
Network security presentation
PPTX
Cyber security
PDF
Computer Security
PDF
Cybersecurity concepts & Defense best practises
PPT
Cyber security & Importance of Cyber Security
PDF
CNIT 140: Perimeter Security
PPSX
Cs tations-pps xversion
PPTX
Computer security
PPTX
5 Security Tips to Protect Your Login Credentials and More
PPTX
Network security (vulnerabilities, threats, and attacks)
PDF
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
PPTX
Network security
PDF
Cisco cybersecurity essentials chapter - 2
PPTX
Career Guidance on Cybersecurity by Mohammed Adam
Cyber security-briefing-presentation
The Importance of Cybersecurity in 2017
CNIT 123: Ch 1 Ethical Hacking Overview
Network Security
Understanding the need for security measures
Network security presentation
Cyber security
Computer Security
Cybersecurity concepts & Defense best practises
Cyber security & Importance of Cyber Security
CNIT 140: Perimeter Security
Cs tations-pps xversion
Computer security
5 Security Tips to Protect Your Login Credentials and More
Network security (vulnerabilities, threats, and attacks)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
Network security
Cisco cybersecurity essentials chapter - 2
Career Guidance on Cybersecurity by Mohammed Adam
Ad

Similar to Securing Devices at Home (20)

DOCX
CyberCore – Security Essentials_ Protecting Your Digital World.docx
PPTX
CS5300 class presentation on managing information systems
PPT
Dos and Dont to be followed to protect information and technology
PPTX
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
PDF
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
PPTX
Cyber Security: A Hands on review
PDF
What Are Some Ways to Secure Your Internet-Connected Devices Against Motivate...
PDF
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
PDF
The top 5 basics fundamentals of network security cyberhunter solutions
PPTX
Cyberattacks.pptx
PPTX
Chapter 5.pptx
PDF
Best Practices to Secure Your Digital Assets.pdf
PDF
Windows 10: Security Focus (part II)
PPTX
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
PPTX
Endpoint Security of database, data file, and information
PPT
ITE v5.0 - Chapter 10
PDF
OSB180: Learn More About Ivanti Endpoint Security
PPTX
Cloud_security.pptx
PPTX
Incident Response for the Work-from-home Workforce
CyberCore – Security Essentials_ Protecting Your Digital World.docx
CS5300 class presentation on managing information systems
Dos and Dont to be followed to protect information and technology
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyber Security: A Hands on review
What Are Some Ways to Secure Your Internet-Connected Devices Against Motivate...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
The top 5 basics fundamentals of network security cyberhunter solutions
Cyberattacks.pptx
Chapter 5.pptx
Best Practices to Secure Your Digital Assets.pdf
Windows 10: Security Focus (part II)
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Endpoint Security of database, data file, and information
ITE v5.0 - Chapter 10
OSB180: Learn More About Ivanti Endpoint Security
Cloud_security.pptx
Incident Response for the Work-from-home Workforce
Ad

More from Symptai Consulting Limited (19)

PPTX
Embracing the Risk and Opportunity of AI & Cloud.pptx
PDF
Migrating to the Cloud - From Preparation to Operation copy.pdf
PDF
Integrated Security for Software Development and Advanced Penetration Testing...
PDF
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
PDF
Keeping security relevant amid digital transformation
PPTX
Realizing the benefits of Digital Transformation
PDF
Preparing your Business for the Data Protection Bill
PPTX
Why cost optimization is the way of the future
PPTX
Best practices for PCI compliance
PPTX
The role of Technology: Battling Financial Crime
PPTX
Data Protection: An Approach to Privacy
PPTX
Data Analytics: Improving Business
PPTX
IT Audit - Evolve and Stay in the Game
PPTX
Balancing Privacy and Digitization
PPTX
Misconceptions of Business Continuity Planning
PPTX
Cyber-Attack and Security: Putting the Audit Committee on High Alert
PPTX
Data mining: How it can Help Boost Effectiveness
PPTX
Can your company survive a modern day cyber attack?
PPTX
Governance: a tool for growth
Embracing the Risk and Opportunity of AI & Cloud.pptx
Migrating to the Cloud - From Preparation to Operation copy.pdf
Integrated Security for Software Development and Advanced Penetration Testing...
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Keeping security relevant amid digital transformation
Realizing the benefits of Digital Transformation
Preparing your Business for the Data Protection Bill
Why cost optimization is the way of the future
Best practices for PCI compliance
The role of Technology: Battling Financial Crime
Data Protection: An Approach to Privacy
Data Analytics: Improving Business
IT Audit - Evolve and Stay in the Game
Balancing Privacy and Digitization
Misconceptions of Business Continuity Planning
Cyber-Attack and Security: Putting the Audit Committee on High Alert
Data mining: How it can Help Boost Effectiveness
Can your company survive a modern day cyber attack?
Governance: a tool for growth

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
Teaching material agriculture food technology
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Cloud computing and distributed systems.
PDF
KodekX | Application Modernization Development
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
cuic standard and advanced reporting.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Advanced methodologies resolving dimensionality complications for autism neur...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Digital-Transformation-Roadmap-for-Companies.pptx
Spectral efficient network and resource selection model in 5G networks
Teaching material agriculture food technology
20250228 LYD VKU AI Blended-Learning.pptx
The AUB Centre for AI in Media Proposal.docx
NewMind AI Monthly Chronicles - July 2025
Cloud computing and distributed systems.
KodekX | Application Modernization Development
Agricultural_Statistics_at_a_Glance_2022_0.pdf
MYSQL Presentation for SQL database connectivity
Review of recent advances in non-invasive hemoglobin estimation
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
Per capita expenditure prediction using model stacking based on satellite ima...
cuic standard and advanced reporting.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

Securing Devices at Home

  • 1. Securing Devices at Home Date: October 22, 2020
  • 2. About Me – The Speaker 2 Rory Ebanks, M.Sc., B.Sc., CCISO, CEH, CHFI, ECSA , CND, CISSP, CCSP, CISM, CISA , CSX, AZ -900 Director Information Security Advisor y Symptai Consulti ng Limite d
  • 3. Focus Areas 3 1. Preparin g for Remote Work 2. Understand in g the Risks of working remote ly 3. Mitigati ng the Risks of working remote ly 4. Protect ing files and device s 5. Additional Tips 6. Q&A
  • 5. 5 Is your business prepared to work from home? • What are the services that are critical to your operations? • What processes are important for the services to be effective? • Who are the people that are important to the process and service? • Can the services be offered remotely? (Cloud, VPN, Terminal Services, etc.) • Do the employees have devices to access the services remotely and are these company owned or personal devices? • If they are personal devices, do they meet your organization’s minimum- security requirements? • Do the employees have adequate Internet access? • If services are not in the cloud can your infrastructure support remote connections? • If remote services are new to your organization have you taken precautions to ensure that your implementation does not expose your organization and its information assets?
  • 6. Understanding the Risks of working Remotely
  • 7. 7 Understanding the Risks While there are many potential solutions to getting your organization up to speed with security in this new reality, we should first understand some of the common cyber-attacks being utilized today. Social Engineering Malware Remote Service Attacks Brute Force Attacks
  • 9. • Malware is a malicious computer program or software with the intention to cause harm to a computer or to retrieve information from the computer. Malware Understanding the Risks 9
  • 11. • Remote service attacks are where cyber criminals attempt to identify and exploit any remote services which may be in use by an organization. Remote Ser vic e Attacks Understanding the Risks 11
  • 13. • Brute force attacks involve guessing various usernames and password combinations until the correct combination is identified to access any site or service protected by passwords. Brute Force Attacks Understanding the Risks 13
  • 14. Mitigating the Risks of working Remotely
  • 15. 15 Mitigating the Risks Two-factor Authentication (2FA) Enabling multi-factor authentication (MFA) is a straightforward way to ensure that the only person who has access to your account is you. Least Privilege Use access control limitations and grant access to resources only on a need to know basis. Strong Passwords A strong password must have a minimum of 10 characters and consist of a mixture of uppercase, lowercase, numbers and have special characters (such as #, @, &). VPN If possible, require the use of a secure VPN to establish a connection to the resources. Backup All important files must be backed up regularly and stored s eparately from the system being backed up. Protect files backed up by encrypting these files with a password.
  • 16. 16 Mitigating the Risks Suspicious emails Avoid opening suspicious emails or attachments, do not click on links in emails or text messages which you were not expecting or comes from an unknown sender. Enable Security Tools Configure anti- malware or anti-virus software and disk encryption on all laptops and mobile devices. Update Keep all devices up to date with the latest system updates and patches Secure home Wi-Fi network Change your home Wi-Fi and the router default password Video conference securely * Ensure there is no sensitive information in your work area or in view of the camera. * Use a headset when conducting conference meetings * password- protect meetings
  • 18. 18 Protecting Files • Use Disk Encryption • Backup Files Regularly • Encrypt Files with Strong Passwords • Use File-Level and Share-Level Security
  • 19. FR 19 Protecting Devices • Use a Privacy Screen • Set a strong BIOS Password • Use Strong Passwords/Biometrics • Install a “Find My Phone” Application • Avoid Leaving Devices Unattended and Unsecured
  • 20. FR 20 Protecting Devices • Keep up-to-date with the latest software updates • When connecting to untrusted wireless network, use a VPN to encrypt your session • Ensure that the most up-to-date virus and malware protection products are installed
  • 22. 22 Tips • Lock your devices & lock your doors • Shutdown your laptop, ideally once per week (not restart) • Employee Security Awareness • Zoom experience: • Don’t use your unique Zoom ID for all meetings • Use a password • If you are the host of the meeting, use the Zoom waiting room. • Upgrade to a paid/enterprise account.
  • 23. Work From Home: Risk Assessment Tool https://www.symptai.com/tools