NSA’s tips on Home Network Security and Internet Behavior

The cyber threat is no longer limited to your office network and work persona. Adversaries realize that targets are typically more vulnerable when operating from their home network since there is less rigor associated with the protection, monitoring, and maintenance of most home networks. Home users need to maintain a basic level of network defense and hygiene for both themselves and their family members when accessing the Internet.

Windows Host OS
1. Migrate to a Modern OS and Hardware Platform
2. Install a Comprehensive Host-Based Security Suite
3. Limit Use of the Administrator Account
4. Use a Web Browser with Sandboxing Capabilities
5. Update to a PDF Reader with Sandboxing Capabilities
6. Migrate to Microsoft Office 2007 or Later
7. Keep Application Software Up-to-Date
8. Implement Full Disk Encryption (FDE) on Laptops

Operational Security (OPSEC)/Internet Behavior Recommendations:
1. Traveling with Personal Mobile Devices
2. Exchanging Home and Work Content
3. Storage of Personal Information on the Internet
4. Use of Social Networking Sites
5. Enable the Use of SSL Encryption
6. Email Best Practices
7. Password Management
8. Photo/GPS Integration

Also read the NSA’s Best Practices on Apple Host OS,  Network Recommendations and Operational Security (OPSEC)/Internet Behavior Recommendations.

Share article:
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

REPLY

You must login in order to reply.

Panel's Jotter

Editor Intelink says:(2012-10-02 10:49:19)

“Een kwaliteitsslag voor school, student en stagebedrijf” Het herkennen en correct behandelen van bedrijfsvertrouwelijke informatie. Het programma speelt tevens doeltreffend in op de sterk toenemende behoefte aan Social Media Integriteit van stag...

On: Stagevoorbereiding voor MBO en HBO: Bewustwording Bedrijfsgeheimen & Social Media Integriteit
Danny Lieberman says:(2011-05-09 13:35:04)

As one of the pioneers in DLP - data loss prevention and an active thought leader in the field since 2003 - it is typical for people who discover that the emperor is naked to take knee jerk reactions. IT and HR procedures are part of a set of data...

On: WikiLeaks legt menselijke factor bloot (EN)
Rachel McShelley says:(2011-03-31 10:01:15)

Blijft helaas onduidelijk waarom BitDefender dit opvallend en vooral ook een beveiligingsrisico vindt.

On: Facebook: 42% onbekende online vrienden
View all replies»

Join us on:

  • Facebook
  • LinkedIn
  • RSS
  • Twitter


Panels

Join our Research Panel!
Sign up for: Study into Information Leakage in the Netherlands 2010


Publications

News and analyses on Human Factors & Awareness


Upcoming events

No events