May 10, 2023 By Jennifer Gregory 3 min read

You depend on your home network for binge-watching your favorite shows and ordering the perfect pair of shoes. When it’s time to pay bills or manage your retirement accounts, you likely head online as well. Not to mention that home networks make it possible for you to work from home and for your kids to do schoolwork. If your home network isn’t up and running, then conducting your personal business and staying entertained can become challenging, if not impossible.

Many people think of a cyberattack as something that happens to large companies. However, home networks are increasingly the targets of cyber criminals, who use them as a gateway to corporate networks through remote workers. Since you are a remote worker, your habits and setup at home can actually be the cause of a major corporate breach, which is definitely a career-limiting, not career-enhancing, move.

“In the age of telework, your home network can be used as an access point for nation-state actors and cyber criminals to steal sensitive information,” said Neal Ziring, National Security Agency Cybersecurity Technical Director. “We can minimize this risk by securing our devices and networks and through safe online behavior.”

By taking extra precautions, you can increase the odds that your home network functions each time you need it throughout your day. Recently, the NSA released best practices to help you secure your home network. The guidelines fell into two categories — changes to make to your network and changes to make to your behavior.

What is network security?

Simple changes keep your network secure

Here are steps to take with your hardware and software to reduce your risk:

  • Upgrade to a modern operating system and keep it up to date. Secure routing devices and keep them up to date.
  • Implement WPA3 or WPA2 on the wireless network.
  • Implement wireless network segmentation.
  • Employ firewall capabilities.
  • Leverage security software.
  • Limit your use of the administrator account.
  • Safeguard against eavesdropping.
  • Limit administration to the internal network only.
  • Schedule frequent device reboots.
  • Set up a secure connection for telework, such as a VPN.
  • Upgrade to a modern browser, and keep it up to date.
  • Set up authentication safeguards, such as two-factor authentication.
  • Configure your email client to use the transport layer security (TLS) option (Secure IMAP or Secure POP3) to encrypt your email in transit between the mail server and your device.

Behavioral shifts make a difference

In addition to physical and process changes you need to make for your home network, the report focuses on ways your behavior can improve cybersecurity. Here are the best practices you should be following when you get online:

  • Keep online activities separate, especially work and home activities. By using separate devices for different activities, you can reduce your risk of personally identifiable information being breached. For example, use a separate device for banking business than for online shopping or social media. Additionally, do not use personal accounts for work purposes such as accessing files.
  • Limit your use of public wireless. Each time you connect over public wireless, your connection is not secure and you put your data and device at risk of breaches. Instead, use a wireless hotspot or VPN.
  • Protect yourself on social media. Make sure to set your profiles to private or friends only to reduce your exposure to unknown people. Additionally, do not post personal information such as your address, phone number or where you work. If you get friend requests from people you do not know or are sent unknown links, proceed with caution, as they may be from cyber criminals.
  • Follow email best practices. Do not open unknown files or click on links that you receive in your email. Consider not using out-of-office notices, which announce you are out of town.
  • Use good password hygiene. Create strong passwords, and do not use the same passwords for multiple accounts. Consider using a password manager, which makes passwords both easier for you to remember and harder to hack.

Adopt NSA best practices to keep data safe

As remote work and increased digital processes facilitate both personal and professional business, cyber criminals are likely to keep home networks in their sights. By taking proactive steps today, both in your setup and habits, you can reduce the risk of having your network inoperable from a hack or breach. And just as important, you don’t want to be known as the person at your company who caused a breach by falling for a phishing scam.

More from Risk Management

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today