Horrors of Remote Work

Before the pandemic hit the world, working at remote locations or rather work from home was supposedly believed to give a sense of joy. But now, work from home has become the new normal with the trend hitting most of the multinational corporations. But as we are trying to combat the virus by confining ourselves to our homes, some data theft ‘viruses’ are lurking outside our homes. With most of us using the setups outside the security layers of office, data thieves are trying to tap on those setups to maximize their wealth.

Remote work might be enjoyable in all aspects, but it also possesses certain downsides which can be horrifying both the recipient and the sender of the network. Looking at various perspectives as well experiencing some, I would like to highlight a few such instances:

  1. Public Wi-Fi network. Usage of public Wi-Fi internet connection to do office work can be very unsecure owing to the malicious parties trying to tap the internet traffic to collect confidential information. Potential malwares such as Trojan horse, virus, worms, spyware, rootkits etc. can very easily damage your service with irreparable effects.
  2. Unlocked device. When working in a public location or at home, sometimes we have the tendency to just leave it and get up to do some chore or to even just get a glass of water. In the meantime the confidential data such as office website, servers or mails gets exposed to the stranger or children at home, which can lead to data leakage, thus compromising the security.
  3. Use of personal devices and networks. Most companies have started this policy where you can use your personal setups such as laptop or desktop at your home. Usually the IT Department configures all the required software in your personal device and you can use it for professional reasons. Issue arises when you are using the same device for your personal work such as installing an app or browsing in such websites which can have malicious content and thus your system, data and majorly, your confidential office data gets compromised. But then the question arises, who is to be blamed here? Is it the organization who allowed the associate to compromise company’s data with the personal setup without enough security firewall? Or is the associate who should have taken care while using it for personal uses?
  4. Wary of VPN. Many a times, the remote workers are over-confident about the confidential data-security and since VPN can make the internet connection a bit slower, people tend to just overlook it. But what they forget in the meantime is that Virtual Private Network (VPN) can restrict the flow of information or data to the intended recipient as well as encrypt the data.
  5. Exposure of home router. It’s a human habit to either go for very weak password or avoid password altogether, lest one might forget. And such a habit can easily throw us into the devil’s mouth.
  6. Opening ‘all’ kinds of e-mails. Hackers and phishers wait for the opportunity to bask in glory when they send us a very catchy and a ‘congratulatory’ kind of mail and wait for our ‘one-click’ on that mail. And after that, everything becomes a history.
  7. Device always switched-on. If we get a notification on our setup asking to restart the system in order to install the updates, we tend to reschedule it to the point when we can avoid it altogether. Non-updated device are the most-prone device to each and every kind of threat.

Just a heads up, these are some, but not exhaustive, lists of threats and danger one can face from remote work. Nevertheless, these also have their own solution but it demands a chunk of our attention and intervention. So from the next time, when you sit down and switch on your system to work, always remember there is an extra pair of eyes looking upon you.

Abort the virus, inside and outside.

Till then, stay safe.

How to find whether a website is fake or genuine

There are over 1.74 billion website on net today .Unfortunately,the internet is full of fake websites also .The evolution in the internet have make convenient to shop ,bank and interact with people all around the globe .But it has also open the ways for Cyber crime. Criminals through a practice called phishing, fraudsters copy a legitimate site and bait customers to provide them personal information.For instance -Debit or credit card numbers,Passport Number.Once customer provide them data they can make use of it to buy and to transfer money which eventually lead to loss of all the money in your bank account.

It can be difficult to detect whether a site is fake or scam sites .Fraudsters are very clever and create a very convincing sites and these phishing sites tend to look original .Criminals can easily target the customers who doesn’t pay attention to small details and trick them easily into provide them sensitive information .

Here are some signs through which one can determine whether a website is fake or genuine .

Ask yourself how you reach here ?

First and foremost ask yourself a question how you get to the site .Through link on email or social media sites.Reason being emails or social media sites are the most effective way criminals used to track customers .Never click on the link given instead simply google it.

Review the result

While visiting the site make sure firstly to read someone reviews about the site on quora or similar forums.Do not trust on the reviews so easily .Go through several forums and even explore their last activities on social media handles . One can also read customers feedback and check the website connection type .A https is a more secured sites rather than site having http designation.Hence ,more trustworthy .This is because most of the fake sites do not go through the process of having https connection type.But we should not rely on this only we should verify it further.

Inspect domain name

A lot of illegitimate websites use domain name as the reference to brand name .But it’s not brands officially site .It’s red signal that something is fishy.AdiDas etc.

Usually most of the shopping site don’t use .org or .biz domain extensions .Be cautious it might be a fake site.

Low prices

Sites offer sometime good discount , if you find that a site is having very low prices with heavy discount more than 50-70%.

Illegitimate sites use heavy discount as a bait for hungry shoppers. Be alert.

Spelling or Grammar mistake

Search for spelling or grammar mistake .Every browser have in built spelling checker and thus there can’t be any justification for spelling mistake.It the website has lot of grammatical mistake .This can be only happen when someone has in hurry built a site to trap the people in intention of making quick profit.

Opt only for secure payments option

Pay only through safe refundable payment option such as credit card or paytm.It’s a red signal if shopping website accept pay via bank transfer.Never opt for non -refundable payment option .

Google safe browsing

Google Safe Browsing is a service offered by Google’s security team built to identify illegitimate websites across the web and tell users of potential harm. They reveal details about the threats they detect and the warnings they show to users.

As the cyber crime reportedly is increasing .Be alert and go through the details of site carefully .

Please comment tour thoughts in the comment below and have a wonderful day.