Insurance Blog
Cyber Security

Cyber Security (3)

Home network security refers to the protection of a network that connects devices to each other and to the internet within a home. Whether it’s staying in touch with friends and family, paying your bills electronically, or teleworking, the internet enables us to accomplish tasks more efficiently and conveniently from the comfort of our own homes. However, as we increasingly embed technology into our daily lives, the risk of security issues also increases. As a result, it’s imperative that home users understand and remain vigilant about the risks of being connected to the internet and the importance of properly securing home networks and systems.

2 Common Misconceptions About Home Network Security

Home users share two common misconceptions about the security of their networks.

  1. They believe that their home network is too small to be at risk of a cyberattack.
  2. They believe that their devices are “secure enough” right out of the box.

Most attacks are not personal in nature and can occur on any type of network—big or small, home or business. If a network connects to the internet, it is inherently more vulnerable and susceptible to outside threats.

Tuesday, 19 March 2019 00:48

Secure Your Wireless Router

Written by

One of the leading cybersecurity firms in the U.S. reported that wireless routers were the most frequently exploited type of device. Yet, all new routers arrive with the same default password: "password." For security purposes that password should be changed toavoid unwanted access and to protect your home network.

Change Your Router Password

The first step to locking down your network is to change your wireless router's administrator password from the default to a more secure password to prevent unauthorized persons from accessing the web-based setup page of your router and changing any of its settings.  

The following instructions are for a Netgear router that was previously set up. If you are setting up a new router, follow the instructions provided. Click here for Linksys instructions.

You've received these emails -- some are obvious, some are not: Phishing emails continue to be one of the most common initial attack vectors employed by for malware delivery and credential harvesting. Attacking the human element—considered the weakest component in every network—continues to be extremely effective. To infect a system, the attacker simply has to persuade a user to click on a link or open an attachment. The good news is that there are many indicators that you can use to quickly identify a phishing email. The best defense against these attacks is to become an educated and cautious user and familiarize yourself with the most common elements of a phishing attack. Below are some common indicators of a phishing email.

  • Suspicious Sender’s Address. Pay attention to the sender's email address. It may imitate a legitimate business. With only few characters altered or omitted, cybercriminals will often use an email address that closely resembles one from a reputable company.
  • Generic Greetings and Signature. Both a generic greeting—such as “Dear Valued Customer” or “Sir/Ma’am”—and a lack of contact information in the signature block are strong indicators of a phishing email. A trusted organization will normally address you by name and provide their contact information.

Contact Us Today

Waltham, MA - 781-890-3740

Hudson, MA - 978-562-5652

Wayland, MA - 508-358-5383

Winthrop, MA - 617-846-0731

Memberships/Awards

trusted choice Baldwin Welsh Parker

S5 Box

Register

You need to enable user registration from User Manager/Options in the backend of Joomla before this module will activate.