<?xml version="1.0" encoding="utf-8"?> 
<rss version="2.0"
  xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
  xmlns:atom="http://www.w3.org/2005/Atom">

<channel>

<title>Блог Start X: заметки с тегом awareness</title>
<link>https://blog.startx.team/tags/awareness/</link>
<description>как поведение людей влияет на безопасность Наши продукты • Дайджесты • Статьи • Список постов</description>
<author>Start X</author>
<language>ru</language>
<generator>E2 (v3820; Aegea)</generator>

<itunes:owner>
<itunes:name>Start X</itunes:name>
<itunes:email></itunes:email>
</itunes:owner>
<itunes:subtitle>как поведение людей влияет на безопасность Наши продукты • Дайджесты • Статьи • Список постов</itunes:subtitle>
<itunes:image href="" />
<itunes:explicit></itunes:explicit>

<item>
<title>How to Work From Home and Stay Safe</title>
<guid isPermaLink="false">176</guid>
<link>https://blog.startx.team/all/remote-safe/</link>
<pubDate>Fri, 27 Mar 2020 16:15:43 +0300</pubDate>
<author>Start X</author>
<comments>https://blog.startx.team/all/remote-safe/</comments>
<description>
&lt;p main&gt;
In recent weeks, many of us have had to readjust our work styles to a new format: to work at home or outside the office. 
&lt;br /&gt;&lt;br /&gt; 
While our security departments are busy preparing secure communication channels and other infrastructure, no one is helping answer simple but important questions: 
&lt;br /&gt;&lt;br /&gt; 
1. How can we work safely in these new conditions?&lt;br /&gt;
2. What are the main safety rules we need to know and follow?&lt;br /&gt;
3. What do we need to know to work efficiently, and not to not become a scam victim of scammers?&lt;br /&gt;
&lt;br /&gt;
In this article, we identify ten key recommendations that will help you, your colleagues, and loved ones work remotely, out of the office, and stay safe.
&lt;/p&gt;
&lt;p aside style="opacity: 1; text-align: center;"&gt;
&lt;img src="https://blog.antiphish.ru/pictures/svoldokhin_new.jpg" width="40%"/&gt; &lt;br /&gt;
&lt;a href="mailto:sv@antiphish.ru"&gt;Sergey Voldohin&lt;/a&gt;&lt;br /&gt;author&lt;br /&gt;&lt;br /&gt;    
&lt;img src="/pictures/andrey2.jpg" width="40%" /&gt; &lt;br /&gt;
&lt;a href="mailto:digest@antiphish.ru"&gt;Andrey Zharkevich&lt;/a&gt;&lt;br /&gt;editor&lt;br /&gt;&lt;br /&gt;
&lt;/p&gt;
&lt;div style="padding: 2em; background-color: cornsilk; width: 70%; margin-bottom: 1em;" &gt;&lt;div &gt;&lt;p&gt;&lt;b&gt;— It’s obvious! &lt;/b&gt;&lt;br&gt;&lt;br /&gt;
Our tips may seem obvious for advanced users and security professionals.&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
If you are responsible for security processes, take a look at the end of the article to learn how to set up a regular security awareness process for your employees.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;h2&gt;1. Your computer and workplace&lt;/h2&gt;
&lt;p style="margin-top: 10px;"&gt;
&lt;a href="/ENP01-Basics_01/index.html" target="_blank" style="border: 0px;"&gt;&lt;img src="/pictures/ENP01-Basics_01.png"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;1.1 Ideally, if you have a corporate laptop: only use this laptop. If you have to use a personal device, make sure that only you will use it for the entire period if you choose working remotely.&lt;/p&gt;
&lt;p&gt;1.2 Lock your computer every time you leave your workplace, even if this place is your room.&lt;/p&gt;
&lt;p&gt;1.3 Do not plug in someone else’s flash drives or other USB device to your computer, even if you’re really curious. Curiosity killed the cat, you know.&lt;/p&gt;
&lt;p&gt;1.4 If you have to work in a public place, check your surroundings. This is especially important when working with confidential information or entering a password. Do not let strangers stand behind you.&lt;/p&gt;
&lt;h2&gt;2. Passwords and access&lt;/h2&gt;
&lt;p style="margin-top: 10px;"&gt;
&lt;a href="/ENP01-Basics_02/index.html" target="_blank" style="border: 0px;"&gt;&lt;img src="/pictures/ENP01-Basics_02.png"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2.1 Learn to choose and set a strong password, even on your personal computer.&lt;/p&gt;
&lt;p&gt;2.2 Use different passwords for different services/applications. To help you manage your passwords use a password manager.&lt;/p&gt;
&lt;p&gt;2.3 Enable two-factor authentication on all services/applications that you use.&lt;/p&gt;
&lt;h2&gt;3. Secure Internet access&lt;/h2&gt;
&lt;p style="margin-top: 10px;"&gt;
&lt;a href="/ENP03-Mobile_03/index.html" target="_blank" style="border: 0px;"&gt;&lt;img src="/pictures/ENP03-Mobile_03.png"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;3.1 Do not connect to unfamiliar wireless networks: it’s better to use your mobile phone as a hotspot and connect to the internet that way Internet.&lt;/p&gt;
&lt;p&gt;3.2 Use your corporate VPN whenever possible.&lt;/p&gt;
&lt;h2&gt;4. Software updates&lt;/h2&gt;
&lt;p style="margin-top: 10px;"&gt;
&lt;a href="/ENP02-Web_02/index.html" target="_blank" style="border: 0px;"&gt;&lt;img src="/pictures/ENP02-Web_02.png"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;4.1 Check that your antivirus, operating system, browser, and other applications are updated regularly.&lt;/p&gt;
&lt;p&gt;4.2 Protect your browser.&lt;/p&gt;
&lt;p&gt;4.3 Do not download or run suspicious files from the Internet, even if they look like updates.&lt;/p&gt;
&lt;h2&gt;5. Updating mobile devices&lt;/h2&gt;
&lt;p style="margin-top: 10px;"&gt;
&lt;a href="/ENP03-Mobile_01/index.html" target="_blank" style="border: 0px;"&gt;&lt;img src="/pictures/ENP03-Mobile_01.png"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Check and enable automatic updates on your mobile devices.&lt;/p&gt;
&lt;h2&gt;6. Applications and messengers&lt;/h2&gt;
&lt;p style="margin-top: 10px;"&gt;
&lt;a href="/ENP03-Mobile_02/index.html" target="_blank" style="border: 0px;"&gt;&lt;img src="/pictures/ENP03-Mobile_02.png"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;6.1 Do not install suspicious applications.&lt;/p&gt;
&lt;p&gt;6.2 Do not click unknown links on your smartphone.&lt;/p&gt;
&lt;h2&gt;7. Suspicious situations&lt;/h2&gt;
&lt;p style="margin-top: 10px;"&gt;
&lt;a href="/ENP01-Basics_03/index.html" target="_blank" style="border: 0px;"&gt;&lt;img src="/pictures/ENP01-Basics_03.png"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;7.1 Check with your security team who you can call or write to if you suspect something suspicious or an incident.&lt;/p&gt;
&lt;p&gt;7.2 Inform your security team of everything that seems suspicious. If you see something, say something.&lt;/p&gt;
&lt;h2&gt;8. Countering fraudsters&lt;/h2&gt;
&lt;p style="margin-top: 10px;"&gt;
&lt;a href="/ENP02-Web_03/index.html" target="_blank" style="border: 0px;"&gt;&lt;img src="/pictures/ENP02-Web_03.png"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;8.1 Learn to recognize the emotions that scammers try to evoke: fear, greed, curiosity, and others.&lt;/p&gt;
&lt;p&gt;8.2 Remember that these emotions turn off critical thinking. As a result, you can perform an action that you would not normally perform.&lt;/p&gt;
&lt;p&gt;8.3 Report to your security department/service everything that seems suspicious.&lt;br /&gt;
Read the article: What you need to know about phishing.&lt;/p&gt;
&lt;h2&gt;9. Safe website browsing&lt;/h2&gt;
&lt;p style="margin-top: 10px;"&gt;
&lt;a href="/ENP02-Web_01/index.html" target="_blank" style="border: 0px;"&gt;&lt;img src="/pictures/ENP02-Web_01.png"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;9.1 The address of any website where you enter a password should begin with HTTPS.&lt;/p&gt;
&lt;p&gt;9.2 If you see an HTTPS error or something suspicious, do not enter your username or password on such a website.&lt;/p&gt;
&lt;h2&gt;10. Safe use of email, links, and files&lt;/h2&gt;
&lt;p style="margin-top: 10px;"&gt;
&lt;a href="/ENP02-Web_04/index.html" target="_blank" style="border: 0px;"&gt;&lt;img src="/pictures/ENP02-Web_04.png"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;10.1 Fraudsters can impersonate your colleagues, partners, and managers. Feel free to call back those people from whom an email or even a message in your messenger supposedly came. When working remotely, you cannot approach a colleague in person, however, you must make sure that it is he or she who writes to you.&lt;/p&gt;
&lt;p&gt;10.2 Learn to distinguish fraudulent emails from real ones.&lt;/p&gt;
&lt;p&gt;10.3 Learn to check links and attached files in emails, on websites, and  messaging apps.&lt;/p&gt;
&lt;p&gt;Read the article: &lt;a href="https://blog.antiphish.ru/all/how-to-know-phishing/"&gt;How to distinguish a phishing email&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;To security teams&lt;/h2&gt;
&lt;p&gt;To organize regular remote learning for your employees, as well as the process of employee security awareness training—fill out the &lt;a href="https://www.antiphish.nl/"&gt;form on the website&lt;/a&gt; or &lt;a href="mailto:ask@antiphish.nl"&gt;write to us&lt;/a&gt; and start the process within the next business day.&lt;/p&gt;
</description>
</item>


</channel>
</rss>