Telework has become an essential component of business, and many people are teleworking from home or during travel. While the owners of home networks can take steps to secure those networks, it can be difficult to ensure public networks (e.g., conference or hotel Wi-Fi®) are secure. Protecting personal and corporate data is essential at all times, but especially when teleworking in public settings. To ensure data, devices, and login credentials remain secure and uncompromised, cybersecurity is a crucial priority for users and businesses. This includes identifying higher-risk public networks and implementing security best practices while in public settings, whether connecting laptops, tablets, mobile phones, wearable accessories, or other devices with the ability to connect to the internet.
Accessing public Wi-Fi hotspots may be convenient to catch up on work or check email, but public Wi-Fi is often not configured securely. Using these networks may make users’ data and devices more vulnerable to compromise, as cyber actors employ malicious access points (Masquerading [T1036]1), redirect to malicious websites, inject malicious proxies, and eavesdrop on network traffic (Network Sniffing [T1040]).[1] In addition to Wi-Fi, cyber actors can compromise other common wireless technologies, such as Bluetooth® and Near Field Communications (NFC) (Exploit via Radio Interfaces
[T1477]). These technologies must be properly configured to ensure user devices remain secure from compromises. The risk is not merely theoretical; these malicious techniques are publicly known and in use.
This infosheet gives National Security System (NSS), Department of Defense (DoD), and Defense Industrial Base (DIB) users the best practices for securing devices when conducting business in public settings. It describes how to identify potentially vulnerable connections and protect common wireless technologies, and lists steps users can take to help secure their devices and data. While these best practices cannot ensure data and devices are fully protected, they do provide protective measures users can employ to improve their cybersecurity and reduce their risks.
相关报告
新冠自我康复手册中文版(WHO)
10w+
类型:专题
上传时间:2022-12
标签:新冠、康复手册)
语言:中文
金额:5积分
清华大学126页PPT:2021元宇宙发展研究报告
10w+
类型:专题
上传时间:2021-09
标签:元宇宙)
语言:中文
金额:免费
美国vs孟晚舟:延后起诉协议全文(英文版)
8.4w+
类型:专题
上传时间:2021-09
标签:美国、孟晚舟)
语言:英文
金额:5积分
举报PPT火了!堪称范本!
7.4w+
类型:专题
上传时间:2021-02
标签:、举报)
语言:中英
金额:免费
91页大报告!2020海南自由贸易港投资指南
6.6w+
类型:专题
上传时间:2020-08
标签:海南自贸港、投资)
语言:中文
金额:免费
2021年政府工作报告(完整版)
5.2w+
类型:专题
上传时间:2021-03
标签:政府工作报告)
语言:中文
金额:5积分
唐山打人案团伙尽调报告_20220612(3)
3.1w+
类型:专题
上传时间:2022-06
标签:唐山打人)
语言:中文
金额:免费
ChatGPT研究框架(2023)
3.0w+
类型:专题
上传时间:2023-02
标签:ChatGPT、研究框架)
语言:中文
金额:5积分
163页报告:元宇宙的未来猜想和投资机遇
2.8w+
类型:专题
上传时间:2021-11
标签:元宇宙)
语言:中文
金额:5积分
2022政府工作报告(完整版)
2.8w+
类型:专题
上传时间:2022-03
标签:政府工作报告)
语言:中文
金额:5积分
积分充值
30积分
6.00元
90积分
18.00元
150+8积分
30.00元
340+20积分
68.00元
640+50积分
128.00元
990+70积分
198.00元
1640+140积分
328.00元
微信支付
余额支付
积分充值
应付金额:
0 元
请登录,再发表你的看法
登录/注册