{"id":14580,"date":"2018-10-12T10:34:11","date_gmt":"2018-10-12T14:34:11","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/?p=14580"},"modified":"2019-11-22T10:02:17","modified_gmt":"2019-11-22T10:02:17","slug":"secure-your-home-network","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/secure-your-home-network\/14580\/","title":{"rendered":"5 tips to protect your home network"},"content":{"rendered":"<p>For the second year in a row, Kaspersky Lab has signed on as an official <a target=\"_blank\" href=\"https:\/\/staysafeonline.org\/ncsam\/ncsam-champions\/\" rel=\"noopener noreferrer nofollow\">Champion<\/a> of National Cyber Security Awareness Month (NCSAM). Over the course of the month, we will be focusing on security topics that can be used by both businesses and consumers alike. For the first week, we will focus on securing your home.<\/p>\n<p>So, let\u2019s get started. Do you:<\/p>\n<ol>\n<li>Have Wi-Fi in your house?<\/li>\n<li>Have at least one device connected to the Internet?<\/li>\n<li>Ever have friends or family over?<\/li>\n<\/ol>\n<p>Now, the big one:<\/p>\n<ol start=\"4\">\n<li>Are you sure everything is secure?<\/li>\n<\/ol>\n<p>Go ahead and answer \u2014 no one is watching (or are they? We\u2019ll come back to that a bit further down). By the end of this post, you will have a more sound answer for No. 4 than you probably do now.<\/p>\n<h2>1. Secure your computer<\/h2>\n<p>Perhaps the simplest place to start with home security is to secure your actual devices. Computers, tablets, and phones are all susceptible to malicious infections from the Internet or from apps that are more than meets the eye \u2014 or that are free, but with a catch.<\/p>\n<p>To protect your devices, the best advice is to install a good antivirus solution. There\u2019s no shortage of capable products reviewed by trusted, independent professionals. They range greatly in price, and you can even get some free. I recommend our <a href=\"https:\/\/www.kaspersky.co.uk\/premium?icid=gb_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a> product because it offers the most advanced protection and covers multiple devices including PC, Mac, Android, and even iOS devices.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n<p>On top of a good antivirus program, it is also a good rule of thumb to download apps only from official sources \u2014 Google Play, Apple\u2019s App Store, or the app\u2019s site. Doing otherwise, you risk ending up with a somewhat modified version of the app you were looking for, with extra features like filling your screen with ads, spying on you, mining cryptocurrencies at your expense, or even stealing your bank account login.<\/p>\n<h2>2. Secure your Wi-Fi<\/h2>\n<p>When you had Internet connectivity added to your home, your provider probably installed its own combination modem\/router, named your home network, and set up a password for you. If you didn\u2019t change that name and set a new password afterwards, now\u2019s the time. The main reason is that you are paying for the service, why let someone take it from you?<\/p>\n<p>Most routers have a default username and password like admin\/admin or admin\/password. A simple Google search for your router model will yield those default credentials. From there, they can rename the network, set a new password, and reconfigure any other available options. Or, you can. Do that now. While you\u2019re in there, be sure to update the router\u2019s firmware.<\/p>\n<p>You should also set up a <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/guest-wifi\/23843\/\" rel=\"noopener noreferrer nofollow\">guest network for friends and family<\/a> who visit your home. I named mine \u201cFBI Van\u201d just to mess with people \u2014 I won\u2019t mention the name of the main Wi-Fi here \u2014 and, obviously, gave it a different password.<\/p>\n<h2>3. Secure smart devices \/ Internet of Things<\/h2>\n<p>Now, if you are connecting IoT devices to your network, I would suggest hooking them up to your guest network rather than the main one, and also changing their default passwords. You may be wondering why you should change the password.<\/p>\n<p>The answer lies in the same issue as the router defaults mentioned earlier. Most IoT devices have a default password that is just a Google search away. Go ahead and check it out for yourself, and then work on changing yours.<\/p>\n<p>A reason this issue causes concern is that many criminals have infected these devices and are adding them to <a target=\"_blank\" href=\"https:\/\/securelist.com\/new-trends-in-the-world-of-iot-threats\/87991\/\" rel=\"noopener noreferrer\">botnets at an alarming rate<\/a>.<a target=\"_blank\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2018\/10\/12153600\/en-iot-malware-collection.png\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-14583\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2018\/10\/12153600\/en-iot-malware-collection.png\" alt=\"\" width=\"800\" height=\"524\"><\/a><\/p>\n<h2>4. Blindfold Big Brother<\/h2>\n<p>Earlier, we asked if anyone was watching you. In some ways, it was a small joke, but it really is sensible to be cautious when it comes to your computer\u2019s webcam. Many apps and websites ask for access to your camera and microphone. What are they doing with it? Well, you never know for sure, but there is a chance that someone, somewhere in the world is actually watching you.<\/p>\n<p>How can you avoid this? You can throw a piece of tape over the camera or buy a webcam protector that you open only when you want to use your camera. Good antivirus programs also offer the ability to restrict access to cameras \u2014 a feature I highly recommend.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-privacy\">\n<h2>5. Keep out USB threats<\/h2>\n<p>One other threat needs to be mentioned, something that affects not only businesses, but also everyday people like you or me.<\/p>\n<p>Have you ever found a USB stick in a parking lot, park, office lobby, or somewhere else? If I shook my Magic 8-Ball, I think it would say signs point to yes. With the amount of trade-show swag and giveaways we all encounter, these devices are basically a dime a dozen, so dropping one won\u2019t cause too much angst.<\/p>\n<p>Now, if you find one, should you plug it into your computer and see what surprises lie within? The answer is just two letters long: No! You see, not only will curiosity probably kill the cat, but it can also bring malware or a hidden cryptocurrency miner onto your device. Don\u2019t believe me? Look no farther back than 2010, when the Stuxnet virus infected the network of an Iranian nuclear facility through a good old USB stick.<\/p>\n<p>Fast-forward to 2018 and <a target=\"_blank\" href=\"https:\/\/securelist.com\/usb-threats-from-malware-to-miners\/87989\/\" rel=\"noopener noreferrer\">recent research from Kaspersky Lab<\/a> shows that USB sticks and other removable media are still very popular among cybercriminals as a means of infection.<\/p>\n<p>I hope these tips help you and bring you a few steps closer to a secure home network. I would also suggest reading up on <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/category\/tips\/\" rel=\"noopener noreferrer nofollow\">the tips we offer on Kaspersky Daily<\/a> to further boost your levels of security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tips to protect your devices, your home network, and your privacy against cybercrime.<\/p>\n","protected":false},"author":636,"featured_media":14581,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1622,9],"tags":[2412,1978,282,1976,1977,131,1484,174],"class_list":{"0":"post-14580","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-tips","9":"tag-advice","10":"tag-awareness","11":"tag-cybersecurity","12":"tag-ncsam","13":"tag-north-america","14":"tag-tips","15":"tag-usb","16":"tag-wi-fi"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/secure-your-home-network\/14580\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/secure-your-home-network\/14446\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/secure-your-home-network\/12086\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-your-home-network\/16387\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/secure-your-home-network\/13547\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/secure-your-home-network\/17157\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/secure-your-home-network\/16462\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/secure-your-home-network\/5605\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-your-home-network\/24202\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/secure-your-home-network\/11059\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/secure-your-home-network\/11011\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/secure-your-home-network\/9957\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/secure-your-home-network\/17943\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/secure-your-home-network\/21796\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/secure-your-home-network\/21330\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/secure-your-home-network\/21338\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/wi-fi\/","name":"wi-fi"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/14580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=14580"}],"version-history":[{"count":9,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/14580\/revisions"}],"predecessor-version":[{"id":17258,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/14580\/revisions\/17258"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/14581"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=14580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=14580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=14580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}