01.11.2023 Views

The Cyber Defense eMagazine November Edition for 2023

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Guest networks are especially important because you don’t know how others use their devices. If their<br />

device is infected, that infection could spread to your networks. Additionally, visitors could lose their<br />

devices or accidentally reveal your network password to others.<br />

If a guest were to lose their device or reveal your guest network password, there is less potential <strong>for</strong> harm<br />

if you have proper network segmentation. Preventing networks from seeing each other provides traffic<br />

and access segmentation, which can prevent network segmentation-caused breaches, such as the attack<br />

on Target many years ago.<br />

Take the time to review your networking needs and develop your own list of networks. If your home<br />

networking equipment provides an option that prevents networks from seeing each other, be sure to<br />

activate it.<br />

6. Continually Update Home Network Equipment<br />

Be sure to continually update your home networking equipment. Just like computers and phones,<br />

networking equipment receives updates, which provide critical security fixes, security enhancements and<br />

new features.<br />

You can view a list of all known vulnerabilities (and their severity levels) associated with your home<br />

network equipment. <strong>The</strong> National Vulnerability Database maintains a list of known Common<br />

Vulnerabilities and Exposures (CVE). <strong>The</strong> CVE number associated with each vulnerability contains the<br />

year it was discovered/registered as a CVE.<br />

Visit https://nvd.nist.gov/vuln/search and provide the make and model of your home network equipment<br />

in the “Keyword Search” box and click the “Search” button. Keep in mind, several of the vulnerabilities<br />

listed may have already been remediated with firmware updates provided by the manufacturer.<br />

If you can’t set up automatic updates, simply set a calendar reminder or opt-in to your network provider’s<br />

notifications to make sure your equipment is running at its most secure state. If you purchase used<br />

equipment or prefer a more manual process, you can reference your home network equipment firmware<br />

and check the manufacturer’s website <strong>for</strong> updates.<br />

Remember to warn other users of your home network be<strong>for</strong>e launching the firmware update, as these<br />

updates usually drop connections while they install the new firmware and reboot.<br />

7. Contact the Manufacturer<br />

Finally, if you want to avoid restarting or restoring network default settings when you are experiencing<br />

issues with your home network, you can always reach out to the manufacturer.<br />

With the rise of remote work and cloud-based storage and applications, it’s vital to keep your household<br />

network and all the in<strong>for</strong>mation in it secure. It’s as important as locking your doors at night.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2023</strong> <strong>Edition</strong> 58<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!