Η National Security Agency (NSA) issued two information sheets for security in cyberspace (CSIs), for employees working from home. These bulletins mainly contain tips and recommendations for its employees National Security System (NSS)Of Department of Defense (DoD) And them system administrators, so that they can protect the networks and deal with incidents security.
The first CSI is entitled "Compromised Personal Network Indicators and Mitigations”And provides information on how home-based employees can recognize and deal with possible infringement of their personal networks. Employees must protect data and equipment provided by government, when working remotely.
In addition, the instructions contained in this CSI include a series of violation indicators (IoC), along with mitigation techniques which can be applied by employees working from home to prevent future attacks and violations. NSA instructions are intended for government employees, but the information given, is useful for employees in all areas.
"There is no way to ensure that personal networks will be completely secure from attacks. The attackers are persistent and continue to find ways to circumvent security checks. Users can also take steps to help prevent future attacksSays the first NSA CSI.
Users should implement the measures security proposed by the NSA, to anyone computer, mobile device or IoT device connected to their personal network.
Some of the steps to mitigate violations include:
- Restart and reset routers
- Disable the remote management feature
- Regular firmware update
- Disconnect infected machines from the network
- Reset passwords
- Use reliable antivirus software and malware
NSA guidelines also suggest more "aggressive actions" to help employees who work from home protect their privacy. Appliances or their network effectively addressing threats.
The second NSA CSI is entitled "Performing Out-of-Band Network Management”And is intended primarily for system administrators. In these instructions, information is given on how to separate traffic and networks to ensure that a compromised device or malicious activity will not affect the operations of the entire network.
"OoB [Out-of-Band] management creates a framework that allows administrators to improve the security of their networks by separating management traffic from operational traffic and ensuring that traffic management comes only from the OoB communication path", Explains the NSA.
As we read in SecurityWeek, the NSA recommends the use of encryption protocols and powerful encryption algorithms, use VPN, continuous monitoring of the network, definition of procedures for detecting malicious activities and much more.