{
    "version": "https:\/\/jsonfeed.org\/version\/1",
    "title": "Блог Start X: заметки с тегом awareness",
    "_rss_description": "как поведение людей влияет на безопасность Наши продукты • Дайджесты • Статьи • Список постов",
    "_rss_language": "ru",
    "_itunes_email": "",
    "_itunes_categories_xml": "",
    "_itunes_image": "",
    "_itunes_explicit": "",
    "home_page_url": "https:\/\/blog.startx.team\/tags\/awareness\/",
    "feed_url": "https:\/\/blog.startx.team\/tags\/awareness\/json\/",
    "icon": "https:\/\/blog.startx.team\/user\/userpic@2x.jpg?1687861408",
    "author": {
        "name": "Start X",
        "url": "https:\/\/blog.startx.team\/",
        "avatar": "https:\/\/blog.startx.team\/user\/userpic@2x.jpg?1687861408"
    },
    "items": [
        {
            "id": "176",
            "url": "https:\/\/blog.startx.team\/all\/remote-safe\/",
            "title": "How to Work From Home and Stay Safe",
            "content_html": "<p main>\r\nIn recent weeks, many of us have had to readjust our work styles to a new format: to work at home or outside the office. \r\n<br \/><br \/> \r\nWhile our security departments are busy preparing secure communication channels and other infrastructure, no one is helping answer simple but important questions: \r\n<br \/><br \/> \r\n1. How can we work safely in these new conditions?<br \/>\r\n2. What are the main safety rules we need to know and follow?<br \/>\r\n3. What do we need to know to work efficiently, and not to not become a scam victim of scammers?<br \/>\r\n<br \/>\r\nIn this article, we identify ten key recommendations that will help you, your colleagues, and loved ones work remotely, out of the office, and stay safe.\r\n<\/p>\n<p aside style=\"opacity: 1; text-align: center;\">\r\n<img src=\"https:\/\/blog.antiphish.ru\/pictures\/svoldokhin_new.jpg\" width=\"40%\"\/> <br \/>\r\n<a href=\"mailto:sv@antiphish.ru\">Sergey Voldohin<\/a><br \/>author<br \/><br \/>    \r\n<img src=\"\/pictures\/andrey2.jpg\" width=\"40%\" \/> <br \/>\r\n<a href=\"mailto:digest@antiphish.ru\">Andrey Zharkevich<\/a><br \/>editor<br \/><br \/>\r\n<\/p>\n<div style=\"padding: 2em; background-color: cornsilk; width: 70%; margin-bottom: 1em;\" ><div ><p><b>— It’s obvious! <\/b><br><br \/>\nOur tips may seem obvious for advanced users and security professionals.<br \/>\n<br \/><br \/><br \/>\nIf you are responsible for security processes, take a look at the end of the article to learn how to set up a regular security awareness process for your employees.<\/p>\n<\/div><\/div><h2>1. Your computer and workplace<\/h2>\n<p style=\"margin-top: 10px;\">\r\n<a href=\"\/ENP01-Basics_01\/index.html\" target=\"_blank\" style=\"border: 0px;\"><img src=\"\/pictures\/ENP01-Basics_01.png\"><\/a><\/p>\n<p>1.1 Ideally, if you have a corporate laptop: only use this laptop. If you have to use a personal device, make sure that only you will use it for the entire period if you choose working remotely.<\/p>\n<p>1.2 Lock your computer every time you leave your workplace, even if this place is your room.<\/p>\n<p>1.3 Do not plug in someone else’s flash drives or other USB device to your computer, even if you’re really curious. Curiosity killed the cat, you know.<\/p>\n<p>1.4 If you have to work in a public place, check your surroundings. This is especially important when working with confidential information or entering a password. Do not let strangers stand behind you.<\/p>\n<h2>2. Passwords and access<\/h2>\n<p style=\"margin-top: 10px;\">\r\n<a href=\"\/ENP01-Basics_02\/index.html\" target=\"_blank\" style=\"border: 0px;\"><img src=\"\/pictures\/ENP01-Basics_02.png\"><\/a><\/p>\n<p>2.1 Learn to choose and set a strong password, even on your personal computer.<\/p>\n<p>2.2 Use different passwords for different services\/applications. To help you manage your passwords use a password manager.<\/p>\n<p>2.3 Enable two-factor authentication on all services\/applications that you use.<\/p>\n<h2>3. Secure Internet access<\/h2>\n<p style=\"margin-top: 10px;\">\r\n<a href=\"\/ENP03-Mobile_03\/index.html\" target=\"_blank\" style=\"border: 0px;\"><img src=\"\/pictures\/ENP03-Mobile_03.png\"><\/a><\/p>\n<p>3.1 Do not connect to unfamiliar wireless networks: it’s better to use your mobile phone as a hotspot and connect to the internet that way Internet.<\/p>\n<p>3.2 Use your corporate VPN whenever possible.<\/p>\n<h2>4. Software updates<\/h2>\n<p style=\"margin-top: 10px;\">\r\n<a href=\"\/ENP02-Web_02\/index.html\" target=\"_blank\" style=\"border: 0px;\"><img src=\"\/pictures\/ENP02-Web_02.png\"><\/a><\/p>\n<p>4.1 Check that your antivirus, operating system, browser, and other applications are updated regularly.<\/p>\n<p>4.2 Protect your browser.<\/p>\n<p>4.3 Do not download or run suspicious files from the Internet, even if they look like updates.<\/p>\n<h2>5. Updating mobile devices<\/h2>\n<p style=\"margin-top: 10px;\">\r\n<a href=\"\/ENP03-Mobile_01\/index.html\" target=\"_blank\" style=\"border: 0px;\"><img src=\"\/pictures\/ENP03-Mobile_01.png\"><\/a><\/p>\n<p>Check and enable automatic updates on your mobile devices.<\/p>\n<h2>6. Applications and messengers<\/h2>\n<p style=\"margin-top: 10px;\">\r\n<a href=\"\/ENP03-Mobile_02\/index.html\" target=\"_blank\" style=\"border: 0px;\"><img src=\"\/pictures\/ENP03-Mobile_02.png\"><\/a><\/p>\n<p>6.1 Do not install suspicious applications.<\/p>\n<p>6.2 Do not click unknown links on your smartphone.<\/p>\n<h2>7. Suspicious situations<\/h2>\n<p style=\"margin-top: 10px;\">\r\n<a href=\"\/ENP01-Basics_03\/index.html\" target=\"_blank\" style=\"border: 0px;\"><img src=\"\/pictures\/ENP01-Basics_03.png\"><\/a><\/p>\n<p>7.1 Check with your security team who you can call or write to if you suspect something suspicious or an incident.<\/p>\n<p>7.2 Inform your security team of everything that seems suspicious. If you see something, say something.<\/p>\n<h2>8. Countering fraudsters<\/h2>\n<p style=\"margin-top: 10px;\">\r\n<a href=\"\/ENP02-Web_03\/index.html\" target=\"_blank\" style=\"border: 0px;\"><img src=\"\/pictures\/ENP02-Web_03.png\"><\/a><\/p>\n<p>8.1 Learn to recognize the emotions that scammers try to evoke: fear, greed, curiosity, and others.<\/p>\n<p>8.2 Remember that these emotions turn off critical thinking. As a result, you can perform an action that you would not normally perform.<\/p>\n<p>8.3 Report to your security department\/service everything that seems suspicious.<br \/>\nRead the article: What you need to know about phishing.<\/p>\n<h2>9. Safe website browsing<\/h2>\n<p style=\"margin-top: 10px;\">\r\n<a href=\"\/ENP02-Web_01\/index.html\" target=\"_blank\" style=\"border: 0px;\"><img src=\"\/pictures\/ENP02-Web_01.png\"><\/a><\/p>\n<p>9.1 The address of any website where you enter a password should begin with HTTPS.<\/p>\n<p>9.2 If you see an HTTPS error or something suspicious, do not enter your username or password on such a website.<\/p>\n<h2>10. Safe use of email, links, and files<\/h2>\n<p style=\"margin-top: 10px;\">\r\n<a href=\"\/ENP02-Web_04\/index.html\" target=\"_blank\" style=\"border: 0px;\"><img src=\"\/pictures\/ENP02-Web_04.png\"><\/a><\/p>\n<p>10.1 Fraudsters can impersonate your colleagues, partners, and managers. Feel free to call back those people from whom an email or even a message in your messenger supposedly came. When working remotely, you cannot approach a colleague in person, however, you must make sure that it is he or she who writes to you.<\/p>\n<p>10.2 Learn to distinguish fraudulent emails from real ones.<\/p>\n<p>10.3 Learn to check links and attached files in emails, on websites, and  messaging apps.<\/p>\n<p>Read the article: <a href=\"https:\/\/blog.antiphish.ru\/all\/how-to-know-phishing\/\">How to distinguish a phishing email<\/a>.<\/p>\n<h2>To security teams<\/h2>\n<p>To organize regular remote learning for your employees, as well as the process of employee security awareness training—fill out the <a href=\"https:\/\/www.antiphish.nl\/\">form on the website<\/a> or <a href=\"mailto:ask@antiphish.nl\">write to us<\/a> and start the process within the next business day.<\/p>\n",
            "date_published": "2020-03-27T16:15:43+03:00",
            "date_modified": "2020-07-24T15:48:41+03:00",
            "_date_published_rfc2822": "Fri, 27 Mar 2020 16:15:43 +0300",
            "_rss_guid_is_permalink": "false",
            "_rss_guid": "176",
            "_e2_data": {
                "is_favourite": false,
                "links_required": [],
                "og_images": []
            }
        }
    ],
    "_e2_version": 3820,
    "_e2_ua_string": "E2 (v3820; Aegea)"
}