• Skip to content
logo logo
  • Blog
Login SIGNUP

cyberattack

Everything you need to know to have a cybersecure trip

July 23, 2019 by HushApp Team

Everything you need to know to have a cybersecure trip

Cybersecurity is a subject that must be taken seriously at all times, even when you take a trip. When organizing your vacation, it is important to take into account all of the necessary safety precautions in order to have a cybersecure trip.

Usually we take our mobile devices everywhere and tend to use them often, both at home and at work. During this time one rarely stops to consider that we will be in areas that do not offer the same level of security that they were expecting. This means that if certain precautions aren’t taken, one could easily become the next victim of a cyberattack.

You don’t need to cancel your well-deserved vacation, just follow these simple tips and enjoy your experience from start to finish.

Tips for a cybersecure trip

1. Block your devices.

The first recommended measure is the simplest. Block your devices with the options available to you, using either a PIN number or a fingerprint ID. While traveling, change them regularly.

2. Be cautious of public Wi-Fi.

When traveling, we are always looking for a Wi-Fi connection. This is why it is important to exercise caution with free access networks as they tend to be the most dangerous. It is best to use Wi-Fi encrypted and to ask the hotel about the security protocol they use before connecting.

3. Avoid accessing your personal data in non-secure connections.

If it is necessary to use a public Wi-Fi connection, avoid accessing personal accounts or confidential data while you are connected to that network. Do not make purchases online or click on advertising banners, and if possible, try not to consult bank accounts.

4. Disable automatic connection.

Most phones, tablets and computers have a configuration that allows you to automatically connect to Wi-Fi networks available in your area. This exposes you to unsafe internet connections without you even knowing it. Before traveling, change this setting so that you must connect your devices to the internet manually.

5. Share your location in a limited way.

It is common to use social networks to share your location with your followers, this can be a threat to your safety. Pointing out your location can signal to criminals that you are not at home or at the hotel where you registered. Limit the information you publish online to avoid these types of threats.

6. Deactivate Bluetooth connectivity.

Like automatic Wi-Fi connectivity, Bluetooth connection can also be a risk. Bluetooth signals can come from anywhere and if your device has it on, nearby attackers can access your mobile. Keep your Bluetooth disabled as much as possible while traveling abroad.

Cybersecure trip for business people

Business travelers are more vulnerable to a cyberattack due to the fact that they handle confidential information for companies, information that could be very valuable to cybercriminals. In their daily work inside or outside the office, they share sensitive organizational information. If the necessary measures are not taken, it could have serious financial consequences.

If you are an executive on a business trip, some measures to have a cybersecure trip are:

  • Share your files from secure applications
    If you need to share or send files from abroad, you should use an application with encryption system such as the HushApp. This will allow you to do send easily and safely from anywhere you are.
  • Install and update the operating systems and your antivirus license
    This is a measure that must be taken inside and outside the home. Make sure you have installed a protection system on your computer. In addition to keeping it and your operating system updated, this level of security applies to applications on your mobile as well.

Take your devices that do not store confidential information and only the necessary documents that you want and need to work with.

International regulations

In addition to implementing these security measures, be aware of laws and regulations involving cyber security in each country you plan to visit. Remember that when we travel we are subject to their legislation.

A suggestion to reinforce your security is to buy a data plan to use to in your destination country, even though it may be limited. This will allow you to check messages, confirm check-in times and keep up to date with other important issues

Whether you are a frequent traveler or not, for business or pleasure, do not let your guard down in terms of cybersecurity. Following these smple steps will allow you to enjoy your trip without compromising your personal or business information.

Filed Under: Cybersecurity Business Tagged With: business travelers, cyberattack, cybersecure trip, personal data, protect files, public Wi-Fi

Cybersecurity for remote workers: benefits, risks and how to solve them

May 3, 2019 by HushApp Team

Cybersecurity for remote workers: benefits, risks and how to solve them

Remote workers are already a business reality, and all companies should know how to manage them. Undoubtedly, this way of work brings benefits for both parties: the employee earns labor flexibility, and the employer can save on expenses that require having more employees.

The statistics confirm these benefits, according to a study carried out by the cybersecurity company OpenVPN, in which 250 IT managers were interviewed, 82% claim to have less stress working in this way, and 30% acknowledge that it allows them to do more work in less time.

Despite the benefits that the home office brings, this method has its disadvantages and can be very dangerous. 90% of IT managers recognize that having remote workers can be a risk to the security of the company. Furthermore, 54% consider that they represent a greater security risk than employees who work in the company itself. Even more alarming, 36% of organizations admit that they have suffered a security incident due to the actions of a remote worker.

It is possible to continue maintaining the benefits that home office brings us in a secure way, as long as the company follows some cybersecurity measures.

Cybersecurity measures for companies with remote workers

1) As with all IT security issues, the main thing is to know the risks to which they are exposed. Therefore, education in cybersecurity for employees should be fundamental, especially for remote workers and it should be part of the corporate culture.

Security policies must be established that clearly explain to employees how to handle sensitive information, especially those that are not within the workplace.

2) Establish basic measures of information security: using VPN, which will also allow the company to monitor who is connected, from where and what they have done. Teaching employees to use strong passwords or avoid using public Wi-Fi networks while they are connected from company devices. in case they have to, following the necessary security measures.

3) Classify the information that requires most protection: the company should review what type of information is accessible according to the profile of the worker, and if it is really necessary to have permission to modify it or it is enough to be allowed to view it.

4) Control devices that store sensitive information: the company must restrict access to information from devices that do not have the security tools established for their protection.

5) Install and maintain updated security solutions on all devices, in order to protect the company from possible malware or other types of cyber threats.

6) It is also important to avoid using computers or personal devices inside or outside the company since these are not controlled by the established security measures.

7) It is advisable to use remote desktops since it allows the employee to connect directly with the company’s servers.

8) Of course, all sensitive information must remain encrypted, this adds a layer of greater security and prevents a possible data leak, even when sharing it with remote workers, customers, suppliers, etc.

That’s why HushApp is the ideal option to manage communication with remote workers, it is a tool that allows you to share files in an easy and totally secure way, even without it being necessary to sign up in the application. It does not require installation since you can access it through its website or through the Android app.

HushApp is thinking to facilitate teamwork protecting the sensitive information of companies.

 

We invite you to try HushApp …

Filed Under: HushApp Tips Tagged With: cyberattack, cybersecurity, data leak, encryption, HushApp, information security, IT, Remote workers, VPN

Cyber crisis: how to manage a reputational crisis caused by cyber attack

November 13, 2018 by HushApp Team

Cyber crisis: how to manage a reputational crisis caused by cyber attack

We always think that it will happen to someone else, but finally it happened to you, you are the victim of a cyber attack. You arrived at that moment where your company suffers not only financial damages, but also negative publicity. Rumors begin and social networks are activated as an unauthorized information dissemination center, all while employees frantically nervous about their future work. This is a cyber crisis, how can a reputational crisis caused by a cyberattack be managed?

During any crisis there are three stages: before, during and after. At all times, the important thing is that the company knows how to deal with them. In the particular case of cyber attacks, it would be advisable to do the following.

The before: better to prevent than to regret

In the past it is not just about being careless because you believe that nothing will happen, it is being aware that it has not happened yet, but at any moment it could. Cyber ​​attacks are the priority of the day and consequently the crisis that entails, too. What can you do to prepare your company?

Know what you are exposed to: It is important that you know the risks to which your company is exposed to. To do so, you must determine what  the most common attacks are, what hackers are looking for, and what damages they could cause. If you have clear answers to the following questions, it will make it easier for you to understand the possible scenarios of cyber attacks:

  • What are my confidential files and how do I protect them? What would happen if these files came to light?
  • What are the financial or legal risks that a cyber attack could cause the company?

Train employees on cybersecurity issues: If the company trains and educates its employees on cybersecurity issues, the risks will be reduced.

Have a crisis manual that includes management in the case of cyber attacks: Many companies manage this manual to handle possible crisis scenarios. With the rise of cyber attacks, it is essential today to talk about cyber crisis and act before they occur.

Carry out simulations of cyber crisis: This will allow you to familiarize yourself and the employees with this type of situation and thus take an approach with organization and calmness.

Have an insurance against cyber attacks: This type of insurance has coverage against cyber risks such as malware, DDos, ransomware, etc. It is important that the company evaluates the possibility of purchasing this type of insurance.

During the cyber crisis:

You have joined the list of companies that have suffered such attacks, now is the time to know how to act.

Convene a crisis committee: This committee must be made up of people with enough authority to make decisions, such as a CEO, board of directors, etc. In addition to the legal team, communication advisors and the computer team are necessary to track the attack.

Search qualified advisors: It is important to hire people who have experience in this type of field. Both legal  and communication advisors must also work hand in hand in their strategies.

Inform all your employees and stakeholders: When a crisis occurs the media will seek, in any way, to obtain a source of information. In addition, employees often disseminate information on their social networks about what happened (even if it is not true). Therefore, employees can unwittingly become spokespersons for the company.

That is why it is essential that the company personally inform its employees of what has happened, before it arrives through others, this will prevent the dissemination of unofficial information.

All the stakeholders involved with the company and especially if they were affected must be properly informed of what is happening. This includes the media, to which they must prepare a respective communication, press conference, or any mode of information considered by the communication advisors more convenient to deal with the crisis.

It is best to recognize when the problem exists and not deny it, because in the end everything can be known in one way or another.

The after and the learning

After the storm comes the calm, after the cyber crisis is over, the company must:

Report how the situation was solved: Your audience should also know how the problem was solved. The more transparent and detailed the better.

Evaluate the situation: Analyze the situation and learn from mistakes, what should be done to improve the company’s security and how to channel it.

We can all be victims of a cyber attack, the important thing is to be aware that we are vulnerable and be prepared, as best we can, to deal with its possible consequences.

Filed Under: Cybersecurity Business Tagged With: confidential files, crisis manual, cyber crisis, cyberattack, cybersecurity, reputational crisis

Are you a cybersecurity geek? 10 signs to show that you are becoming one

October 2, 2018 by HushApp Team

Are you a cybersecurity geek? 10 signs to show that you are becoming one

Being a geek is a way of life, it’s about being passionate about what you like the most, keeping up with the latest technology, and watching all the movies and science fiction series. It also is about being aware of all details, forums or blogs that comment on your favorite topics (in addition to buying all possible gadgets and toys). But as a technology lover, you are aware of all the threats that exist on the Internet, and you have so many security measures that- wait, are you becoming a cybersecurity geek?  

We have repeated on several occasions how important it is to protect yourself against a cyberattack, and never to be paranoid enough about cybersecurity, but there may be some exceptions … If you show three or more of these signs when you protect yourself from a cyberattack, you may already be a cybersecurity geek 🙂

Are you becoming a cybersecurity geek?  

  1. Make daily backups of your data or every few hours. 
  2. Do not open attachments from NOBODY.  
  3. Do not use any social network, or if you do, use them with false name and profile photo.
  4. Use more than one antivirus for each device.
  5. Never use Windows, a good cybersecurity geek always knows not to use this operating system, even if he has the best antivirus (or more than one).
  6. Visit pages of companies or computer security organizations daily to be aware of possible threats.
  7. Establish protocols and infrastructure for a Disaster Recovery Plan (DRP) … at home.
  8. Search daily on the Internet to know what information about you is published on the web, there are even some people that have a Google Alert with their name configured. Even think of hiring a company that searches in the most remote corner of the internet to know what  private information is online and can help you erase it.
  9. Protecting your router, but not only with the basic measures such as, passwords, signal range and others. You have to go further, better, think about covering the walls of your house with layers of aluminum foil, this will drastically reduce the intensity of the signal.
  10. Place removable devices (such as USB encrypted) in secret locations that you can use to send to your recipients. Although it is a measure used by cybersecurity experts and hackers, in your day to day life, believe me, you will need to. However we have some better options for you … 

If you do some of these actions I think you better take it easy. It is not necessary for security of your confidential information to be problem for your life, there are much simpler options. We want to make your life easier, with HushApp you can keep your information safe and secured while having peace of mind that your confidential files remain safe. 

 

We invite you to try HushApp …

Filed Under: HushApp Tips Tagged With: cyberattack, cybersecurity, Cybersecurity geek, geek, hacker, hacking, HushApp

logo HushApp made in EU

HushApp allows to protect and send files safely without complications, in any platform. Sign up for HushApp and enjoy the peace of mind of end-to-end encryption.


Product
Features Pricing Android App iOS App coming soon Web App
Users
Book a demo FAQ Guide Support
Business
Hush for Business GDPR Use cases
About
About us Jobs Terms of Use Privacy Policy Legal
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy
Necessary Always Enabled