It usually happens in the form of email which appears to come from a trustworthy source, but is actually a fraudulent attempt to “bait” the user into giving up privileged information.
They might be after you or your clients’ personal information, such as passwords or bank accounts, or they might be phishing for your company’s proprietary data. Either way, the consequences could be devastating, ranging from massive breaches to individual identity theft.
Even though this is one of the simplest types of cyberattacks, it’s also the most effective. Data from the Identity Theft Resource Center and CyberScout reported 1,579 successful data breaches in 2017 . That eye-raising number is almost a massive 45% uptick from the year before, illustrating that the issue of phishing and cyber threats is continuously on the rise.
Users are getting smarter, but so too are cybercriminals with new and unique strategies that seem impossible to keep up with - especially since they go undetected by antivirus software.
Unfortunately, phishing scams are just one type of cyber attack you need to be cautious of.
Additional cyber security threats
Phishing can happen both on- and off-site, but there are additional cyberattacks more targeted at remote work performed on personal computers with fewer security features.
Pharming: Sometimes known as “phishing without a lure”, hackers install code to redirect traffic to a fake, malicious site without the user’s knowledge or consent.
Malware: An umbrella term for harmful viruses, worms, and Trojans, malware software typical steals data or destroys computer code.
Denial of Service (DOS): A DOS attack threatens network security by sending huge volumes of connection requests until the network becomes overwhelmed and unable to function.
Password Attacks: Without a strong enough password, cybercriminals could crack your password and gain access to your private accounts.
Man-in-the-Middle (MitM): In this scam, a hacker disrupts network security by inserting themselves between the user’s communication and the server.
Malvertising: Be wary of “mal” advertising, or infected ads which, when clicked on, install malicious code onto your device.
Rogue hotspots: Disguised by a name similar to legitimate WiFi, connecting to a rogue server allows hackers to intercept information and inject malware to connected devices.
These scams only scratch the surface of the different ways you could fall victim to cybercrime. Additional threats like WiFi spoofing, Firesheep, and Honeypot attacks help explain why hackers love public WiFi and why unsecured remote work over the Internet can be so dangerous.
Unsuspecting users fall victim at coffee shops, hotels, and airports. Even the 2018 World Cup attendees were warned against the possible cybercrimes at hand .
Unsecured networks are so risky that the Norton® security software company reported that 60% of consumers are more afraid of using public WiFi than using a public restroom . Yikes.
Fortunately, there are several measures you can take to protect your company, your job, and yourself, whether you’re a large corporation, global enterprise, small business owner, or average Joe.
Learn these essential strategies to safeguard your sensitive information and get more peace of mind over remote work and personal online activity.
What is a VPN?
When you perform remote work on an unsecured, public WiFi network, essentially anyone with the right motivation and know-how can “read” whatever information you input. This could include confidential emails, privileged documents, proprietary data, client databases, personal financial information, and much, much more.
Any and all information worth protecting is worth learning how to set up a VPN - even if you’re just shopping on an eCommerce site .
A VPN (Virtual Private Network) is a collection of discrete servers networked together via links through a public server. They offer network security by exchanging your trusted keys with a remote data center on a far away network. Traffic appears to come from the VPN’s server, meaning your actual IP (Internet Protocol) address remains hidden to anyone attempting to access it.
VPNs enable business professionals to safely perform remote work by accessing a company’s network resources or documents while being physically off the LAN (Local Access Network).
The bottom line: setting up a VPN ensures any information you send or receive stays hidden from potentially prying eyes.
How to set up a VPN
To set up a VPN, you first need to choose a VPN service provider. Make sure you choose one that you can trust in terms of pricing and security. They should also enable at least five devices to connect at once.
After you choose a provider to set up a VPN, you (and your employees, if applicable) will be required to download the company’s app or software. Note that in some cases, you can avoid installation by configuring your device to connect directly to the VPN - a good option for those worried about surveillance within app ecosystems .
Launch the application, enter your established login credentials, and follow any instructional prompts to connect to the server.
Once you’re logged in, you’re good to go. Your identity, communication, and privately accessed files will be securely tunneled through the VPN network during your remote work.
It’s important to note the limitations of setting up a VPN. Although they provide essential network security, determined hackers can nonetheless steal information using other malicious strategies.
How to create a safe password
The recent Adobe password breach affected 38 million users, illustrating what a serious threat this cyber attack poses .
There are three common methods to a password attack that a hacker might attempt in order to infiltrate network security and gain access to sensitive information.
1. Brute Force: generating a list of potential passwords (by systematically searching large keystrokes) via a computer program or script
2.Dictionary: cycling through common words or phrases which are most likely to succeed
3. Key Logger: tracking a user’s every keystroke through malware installed on the device
The previous train of thought encouraged users to choose a favorite phrase and intersperse it with a few characters and letters. For example: P4$$w0rd. These may be difficult for the human eye to process, but they’re still easy for robot computers to guess.
Passwords consisting of 20+ random characters are your safest bet, but these are difficult to manage and remember.
To create a safe password you can actually recall, IT experts recommend these tips :
Make your passwords long. Computer programs run through databases of likely combinations; a longer password with 12+ characters will be harder to hack
Avoid predictable phrases. Don’t make a password out of names, places, significant dates, or common dictionary terms
Use different passwords. Switch up login credentials across various platforms so that if one is compromised, the others remain safe
Security expert Bruce Schneier suggests taking a sentence and turning it into a password . For example: Ltime@go-inag~faaa! = Long time ago in a galaxy not far away at all.
You should also consider adding an extra layer of network security with a two-step, multi-factor authentication method. If you need help remembering your various login information, a password manager can be very helpful.
Remember, a password attack can occur with even the most advanced network security. If you’re unsure if your password is safe enough, test its strength on sites like How Secure Is My Password.
How to send encrypted emails
Encrypted emails convert data into cipher code in order to defend against unauthorized access to private information.
Imagine an encrypted email as if it were written with special blue light ink, containing a message only legible to the select few who have the proper light to make the words appear.
Encryption defends against hackers, but it also protects private information on vulnerable devices that could be potentially misplaced or stolen.
Learning how to encrypt emails will require you to research the security configurations on whichever platform you use (Outlook™, Gmail™, iOS™, etc.) and make the necessary setting changes . You won’t need to have a degree in cryptography, but you will need to be a bit tech savvy.
You can also use tools such as Virtu®, ProtonMail®, and Signal® to send encrypted emails if you need help ciphering communication while working remotely.
How to set up a firewall
Firewalls protect network security by monitoring, allowing, and blocking traffic based on a defined set of security parameters. They’re used to establish a barrier between an untrusted external network (i.e. the Internet) and a secure internal network.
Without a firewall set up, hackers, keyloggers, and Trojan viruses can attack through unpatched security holes.
You can also set up a firewall using your router’s hardware if it’s not already installed out of the box. The Gibson Research site lets you check your router’s network security by using their ShieldsUp tool.
How to protect your personal information
Phishing and cyber attacks aren’t exclusive to business executives.
Personal laptop and PC users are equally vulnerable to being hacked, so learning how to set up a VPN, create a strong password, encrypt communication, and build a firewall is worth everyone’s while.
Whether or not you learn how to set up a VPN on your personal computer, you should always be wary of what links you follow, files you download, and sensitive information you provide.
If you’re not diligent, you could give con artists your bank account number, Social Security number, or access to personal records, leading to a whirlwind of trouble.
What laptop is best for working remotely?
Good, old common sense will go a long way in terms of remote work and network security. Avoid clicking untrustworthy links, always use your VPN, and never share your password.
Set yourself up for safe success by using the best laptop for remote work. Many HP laptops, like the HP EliteBook 800 series, come loaded with advanced security features to give you increased confidence.
HP Sure Start, Sure Run, and Sure Recover work together to encrypt data, manage applications, and detect viruses. You’ll also benefit from a number of proven productivity features that help streamline your remote work while ensuring its protection.
Using the best laptop for remote work, taking advantage of the available security features, setting up a VPN, and diligently following proper security protocols will prevent sensitive information from winding up in the wrong hands.
Start making necessary laptop security upgrades before you’re blindsided by a breach.
Kaelee Nelson is a contributing writer for HP® Tech Takes. Kaelee is an experienced writer based in Southern California and specializes in creating informative content related to technology and digital culture.
We are working to meet the current extraordinary customer demand for our products. Our website reflects current product availability but circumstances are dynamic. You may check your order status via our Track My Order page (Click Here to log in). We will send updates by email as soon as they are available. We greatly value your business and appreciate your ongoing patience as we work to get your order to you.
Prices, specifications, availability and terms of offers may change without notice. Price protection, price matching or price guarantees do not apply to Intra-day, Daily Deals or limited-time promotions. Quantity limits may apply to orders, including orders for discounted and promotional items. Despite our best efforts, a small number of items may contain pricing, typography, or photography errors. Correct prices and promotions are validated at the time your order is placed. These terms apply only to products sold by HP.com; reseller offers may vary. Items sold by HP.com are not for immediate resale. Orders that do not comply with HP.com terms, conditions, and limitations may be cancelled. Contract and volume customers not eligible.
HP’s MSRP is subject to discount. HP’s MSRP price is shown as either a stand-alone price or as a strike-through price with a discounted or promotional price also listed. Discounted or promotional pricing is indicated by the presence of an additional higher MSRP strike-through price.
The following applies to HP systems with Intel 6th Gen and other future-generation processors on systems shipping with Windows 7, Windows 8, Windows 8.1 or Windows 10 Pro systems downgraded to Windows 7 Professional, Windows 8 Pro, or Windows 8.1: This version of Windows running with the processor or chipsets used in this system has limited support from Microsoft. For more information about Microsoft’s support, please see Microsoft’s Support Lifecycle FAQ at https://support.microsoft.com/lifecycle
In-home warranty is available only on select customizable HP desktop PCs. Need for in-home service is determined by HP support representative. Customer may be required to run system self-test programs or correct reported faults by following advice given over phone. On-site services provided only if issue can't be corrected remotely. Service not available holidays and weekends.
Not all features are available in all editions or versions of Windows. Systems may require upgraded and/or separately purchased hardware, drivers, software or BIOS update to take full advantage of Windows functionality. Windows is automatically updated and enabled. High speed internet and Microsoft account required. ISP fees may apply and additional requirements may apply over time for updates. See http://www.windows.com.
HP Rewards qualifying and eligible products/purchases are defined as those from the following categories: Printers, Business PCs (Elite, Pro and Workstation brands), select Business Accessories and select Ink, Toner & Paper.My HP Rewards
*SpencerLab Sept 2021 study of printer inks sold in North America commissioned by HP for on-average performance of 16 brands of non-HP refill, remanufactured, and imitation cartridges vs. Original HP Ink SKUs 952XL, 63XL, 902XL, 950XL, 951XL. To account for reliability-driven supplies issues, defective and failed cartridges were included in the page yield calculations. Consequently, the reported page yield numbers are not based on ISO/IEC 24711 standard methodology, as it requires defective supplies be excluded from page yield calculation. See https://spencerlab.com/reports/HPInkReliability-NA-2021.pdf
Help protect your printer and your data with Original HP cartridges: HP office-class printing systems are select Enterprise and Managed devices with FutureSmart firmware 4.5 and up, Pro devices, LaserJet models
The personal information you provide will be used according to the HP Privacy Statement