{"id":76037,"date":"2019-08-02T10:58:56","date_gmt":"2019-08-02T10:58:56","guid":{"rendered":"https:\/\/designbuzz.com\/?p=76037"},"modified":"2019-08-05T09:06:28","modified_gmt":"2019-08-05T09:06:28","slug":"a-guide-to-safeguarding-every-device-in-home-and-office","status":"publish","type":"post","link":"https:\/\/designbuzz.com\/a-guide-to-safeguarding-every-device-in-home-and-office\/","title":{"rendered":"A Guide to Safeguarding Every Device in home and office"},"content":{"rendered":"<div class=\"79269cf5c79b40a0fba5c0560fa469d3\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block; text-align:center;\"\r\n     data-ad-layout=\"in-article\"\r\n     data-ad-format=\"fluid\"\r\n     data-ad-client=\"ca-pub-9477973674766713\"\r\n     data-ad-slot=\"8885944693\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Our <em><strong>devices<\/strong> <\/em>are connected in ways that has never been seen before. You can copy a selection on your laptop and then paste it immediately after on your phone. You can pick up where you left off from your work computer on your home computer if you are taking the afternoon off.<!--more--><\/p>\n<p>The potential for these endpoint devices and the cloud is huge, but it is also a huge security issue. More endpoints mean, in essence, more weak points. An employee accidentally downloading a trojan horse could mean a breach in your company\u2019s data.<\/p>\n<h2><strong>Risks that Come with The Cloud and the Internet of Things<\/strong><\/h2>\n<p>There are two main risks that come with both <a href=\"https:\/\/www.forbes.com\/sites\/forbesdallascouncil\/2019\/02\/01\/how-to-maximize-your-benefits-with-cloud-computing\/\" target=\"_blank\" rel=\"noopener\">Cloud Computing<\/a> and the Internet of Things.<\/p>\n<h3><strong>1. Increased Risk of Hacking <\/strong><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-76041\" src=\"https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Risk-of-Hacking.jpg\" alt=\"Risk-of-Hacking\" width=\"800\" height=\"450\" srcset=\"https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Risk-of-Hacking.jpg 800w, https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Risk-of-Hacking-300x169.jpg 300w, https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Risk-of-Hacking-768x432.jpg 768w, https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Risk-of-Hacking-600x338.jpg 600w, https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Risk-of-Hacking-585x329.jpg 585w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Though the cloud provider is responsible for the infrastructure and to keep security top notch, there are responsibilities beholden to their clients. These responsibilities include tasks such as limiting access to information, limiting breaches from their endpoints, and to refrain from uploading compromised data.<\/p>\n<h3><strong>2. Increased Number of Weak Spots<\/strong><\/h3>\n<p>With the <a href=\"https:\/\/www.theguardian.com\/technology\/2015\/may\/06\/what-is-the-internet-of-things-google\" target=\"_blank\" rel=\"noopener\">Internet of Things<\/a>convenience is at an all-time high, but so too are the number of weak spots in your company\u2019s system.<strong>\u00a0<\/strong><\/p>\n<h2><strong>How to Protect Every Device<\/strong><\/h2>\n<p>To protect every device, you will want to follow these tips:<\/p>\n<h3><strong>1.\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Invest in Proper Endpoint Protection<\/strong><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-76075\" src=\"https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Invest-in-Proper-Endpoint-Protection.jpg\" alt=\"Invest in Proper Endpoint Protection\" width=\"800\" height=\"469\" srcset=\"https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Invest-in-Proper-Endpoint-Protection.jpg 800w, https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Invest-in-Proper-Endpoint-Protection-300x176.jpg 300w, https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Invest-in-Proper-Endpoint-Protection-768x450.jpg 768w, https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Invest-in-Proper-Endpoint-Protection-600x352.jpg 600w, https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Invest-in-Proper-Endpoint-Protection-585x343.jpg 585w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Endpoint protection can easily be acquired through digital security products offered by McAfee, who specialize in <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-protection-products.html\" target=\"_blank\" rel=\"noopener\">endpoint protection<\/a>. Endpoints refer to every device that connects to your system, and if any one of them is compromised, it could act as a backdoor to your data.<\/p>\n<h3><strong>2.\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Only Download Reputable Apps<\/strong><\/h3>\n<p>Only use and download programs and documents that are from a reputable provider. This applies to phones, watches, computers, and more. If you can, try to scan these programs before you install them onto any device that has access to your network.<\/p><div class=\"79269cf5c79b40a0fba5c0560fa469d3\" data-index=\"2\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block; text-align:center;\"\r\n     data-ad-layout=\"in-article\"\r\n     data-ad-format=\"fluid\"\r\n     data-ad-client=\"ca-pub-9477973674766713\"\r\n     data-ad-slot=\"8885944693\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n\n<h3><strong>3.\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Learn the Latest Hacking Threats<\/strong><\/h3>\n<p>Learn both the most common hacking threats (clicking on a suspicious link or downloading a suspect file) and stay up to date with the latest hacking threats. Criminals are very crafty, and a trojan email won\u2019t look like an obvious spam newsletter. It will be a professionally crafted email from your bank, or it might look like it has come from the government. Either way, always proceed with caution and learn (and teach your employees) what to look out for.<\/p>\n<h3><strong>4.\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Use Unique Passwords<\/strong><\/h3>\n<p>Ensure everyone <a href=\"https:\/\/smallbiztrends.com\/2015\/02\/ways-to-remember-passwords.html\" target=\"_blank\" rel=\"noopener\">uses unique passwords<\/a> and double up on access rights and restrictions on your cloud account. A low-level employee does not need to and should never have access to, say, your financial records. By limiting data this way, you can contain a breach before it becomes an issue.<\/p>\n<h3><strong>5.\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Encrypt What You Can <\/strong><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-76045\" src=\"https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Encrypt-What-You-Can.jpg\" alt=\"Encrypt What You Can\" width=\"800\" height=\"534\" srcset=\"https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Encrypt-What-You-Can.jpg 800w, https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Encrypt-What-You-Can-300x200.jpg 300w, https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Encrypt-What-You-Can-768x513.jpg 768w, https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Encrypt-What-You-Can-600x401.jpg 600w, https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Encrypt-What-You-Can-585x390.jpg 585w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Encrypt what data you can and try to store an up-to-date copy of key information about your company offline. This way a hack will turn up nothing and you will have the bare bones of your company to build your brand back up if a ransomware attack goes too far.<\/p>\n<h3><strong>6.\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Run Safety Checks<\/strong><\/h3>\n<p>Hire an IT company and run regular safety checks on your system. Look for faults within your system, improve them, audit your strategy, and always strive to fortify your firewall and security protections further.<\/p>\n<h3><strong>7.\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Keep All Apps and Programs Updated <\/strong><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-76046\" src=\"https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Keep-All-Apps-and-Programs-Updated.jpg\" alt=\"Keep All Apps and Programs Updated\" width=\"800\" height=\"534\" srcset=\"https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Keep-All-Apps-and-Programs-Updated.jpg 800w, https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Keep-All-Apps-and-Programs-Updated-300x200.jpg 300w, https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Keep-All-Apps-and-Programs-Updated-768x513.jpg 768w, https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Keep-All-Apps-and-Programs-Updated-600x401.jpg 600w, https:\/\/designbuzz.com\/wp-content\/uploads\/2019\/08\/Keep-All-Apps-and-Programs-Updated-585x390.jpg 585w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Keep all the apps and programs updated. This applies to anyone whose device is connected to your device. If anyone isn\u2019t using an app, have them delete it so that there are no weaknesses.<\/p>\n<p>Protecting every device on your network can be difficult, but it is not impossible. With the right strategy, tools, and know-how you can reduce the risk of an external threat substantially.<\/p>\n<p>Article Submitted By Community Writer<\/p>\n<div class=\"79269cf5c79b40a0fba5c0560fa469d3\" data-index=\"3\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n          <p><a id=\"link-15\" href=\"\" target=\"_blank\" rel=\"noopener noreferrer\">\r\n            <img decoding=\"async\" style=\"width:100%;height:auto;\" id=\"img-15\" src=\"\"><\/a><\/p>\r\n            <script>\r\n            var xmlhttp = new XMLHttpRequest();\r\n            xmlhttp.onreadystatechange = function() {\r\n              if (this.readyState == 4 && this.status == 200) {\r\n                var myObj = JSON.parse(this.responseText);\r\n                document.getElementById(\"link-\"+myObj.id).setAttribute('href',myObj.url);\r\n                document.getElementById(\"img-\"+myObj.id).setAttribute('src','https:\/\/fetch.drprem.com\/\/uploads\/'+myObj.image);\r\n              }\r\n            };\r\n            xmlhttp.open(\"GET\", \"https:\/\/fetch.drprem.com\/\/api\/Ads\/15\", true);\r\n            xmlhttp.send();\r\n            <\/script>\r\n        \r\n        <style>\r\n        *{box-sizing:border-box}.top-container{display: grid;grid-template-columns: auto auto auto;}.column{float:left;width:100%;padding: 0 7.5px 15px 7.5px;}.row{margin:0 -5px}.row:after{content:\"\";display:table;clear:both}@media screen and (max-width: 600px){.top-container{display: block;grid-template-columns: unset;}.column{width:100%;display:block;margin-bottom:20px}}.card{text-align:center;}.card_image img{width:100%}.card_body{padding:15px}.card_title{font-size: 14px;line-height: 19px;text-decoration: none;text-align:left;color: #333;}.card-heading{text-align: left;margin-bottom: 25px !important;}\r\n        <\/style>\r\n        <div class=\"row todays-top\">\r\n            <h3 class=\"card-heading\"> Today's Top Articles: <\/h3><div class=\"top-container\" id=\"todays-top\">\r\n        <\/div>\r\n        <\/div>\r\n        <script>\r\n            var xmlhttp = new XMLHttpRequest();\r\n            xmlhttp.onreadystatechange = function() {\r\n            if (this.readyState == 4 && this.status == 200) {\r\n            var myObj = JSON.parse(this.responseText); \r\n            myObj.forEach(function(item) {\r\n            document.getElementById('todays-top').innerHTML += '<div class=\"column\"><div class=\"card\"><div class=\"card_image\"><a href=\"'+item.url+'\"><img decoding=\"async\" src=\"'+item.image+'\"><\/a><\/div><div class=\"card_body\"><a href=\"'+item.url+'\"><h3 class=\"card_title\">'+item.title+'<\/h3><\/a><a href=\"'+item.url+'\">Read more<\/a><\/div><\/div><\/div>';\r\n            });\r\n            }\r\n            };\r\n            xmlhttp.open(\"GET\", \"https:\/\/fetch.drprem.com\/api\/Blogs\", true);\r\n            xmlhttp.send();\r\n            <\/script>\r\n        \r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<style>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t.videoWrapper{position:relative;padding-bottom:56.25%;height:0}.videoWrapper iframe{position:absolute;top:0;left:0;width:100%;height:100%}\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/style>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"videoWrapper\" id=\"video_7\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<script>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tvar xmlhttp = new XMLHttpRequest();\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t            xmlhttp.onreadystatechange = function() {\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t            if (this.readyState == 4 && this.status == 200) {\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                var myObj = JSON.parse(this.responseText);\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                document.getElementById(\"video_\"+myObj.id).innerHTML = myObj.embed_video_code;\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t            }\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t            };\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t            xmlhttp.open(\"GET\", \"https:\/\/fetch.drprem.com\/api\/Videos\/7\", true);\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t            xmlhttp.send();\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/script>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Our devices are connected in ways that has never been seen before. You can copy a selection on your laptop and then paste it immediately after on your phone. You can pick up where you left off from your work &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/designbuzz.com\/a-guide-to-safeguarding-every-device-in-home-and-office\/\"> <span class=\"screen-reader-text\">A Guide to Safeguarding Every Device in home and office<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[5456],"tags":[9699,9704,23,6551,9702,9703,9700,9698,9706,18,9705,9701],"class_list":["post-76037","post","type-post","status-publish","format-standard","hentry","category-offbeat","tag-device-in-home-and-office","tag-endpoint-protection","tag-featured","tag-internet-of-things","tag-protect-every-device","tag-reputable-apps","tag-risk-of-hacking","tag-safeguarding-every-device","tag-safety-checks","tag-top","tag-unique-passwords","tag-weak-spots"],"_links":{"self":[{"href":"https:\/\/designbuzz.com\/wp-json\/wp\/v2\/posts\/76037"}],"collection":[{"href":"https:\/\/designbuzz.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/designbuzz.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/designbuzz.com\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/designbuzz.com\/wp-json\/wp\/v2\/comments?post=76037"}],"version-history":[{"count":0,"href":"https:\/\/designbuzz.com\/wp-json\/wp\/v2\/posts\/76037\/revisions"}],"wp:attachment":[{"href":"https:\/\/designbuzz.com\/wp-json\/wp\/v2\/media?parent=76037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/designbuzz.com\/wp-json\/wp\/v2\/categories?post=76037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/designbuzz.com\/wp-json\/wp\/v2\/tags?post=76037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}