April

NIST PR.AC-3

“Taking Security anywhere we go”

Mobile & Remote Work

As we work from home, coffee shops, and airports, our 'office' perimeter disappears. Security must travel with you.

Cautionary tale: The 'Evil Twin' Wi-Fi

An executive waiting for a flight connected to what they thought was the airport’s official Wi-Fi, labeled “Airport_Free_HighSpeed.” In reality, it was an “Evil Twin”—a hotspot set up by a hacker sitting nearby with a small device.

Because the executive wasn’t using a VPN, the hacker was able to intercept every piece of data leaving the laptop. By the time the executive landed at their destination, the hacker had already captured their login credentials for the company’s internal portal and was browsing sensitive corporate files.

The Lesson: You can never trust a public Wi-Fi network, no matter how legitimate the name looks. Hackers bank on your need for a quick connection.

Tips and Tricks for Security on the go

  • Use a VPN: Always turn on the company VPN before accessing work email or files on public Wi-Fi. It creates an encrypted “tunnel” that keeps hackers out.

  • Disable “Auto-Join”: Set your phone and laptop to not automatically connect to known Wi-Fi networks. This prevents your device from accidentally connecting to a malicious hotspot that is spoofing a name you’ve used before.

  • Visual Privacy: When working in public, be aware of “Shoulder Spies”. Use a privacy screen filter so the person sitting next to you can’t read your emails or see your password.

  • Device Encryption: Ensure your work phone and laptop are encrypted and protected by a strong passcode or biometric (FaceID/Fingerprint).

Spotting Mobile Risks

  1. “Unsecured” Network Warnings: If your device warns you that a network is “unsecured” or has an invalid certificate, disconnect immediately.

  2. Left Behind: A lost, unencrypted phone is a massive data breach. Treat your work devices like your wallet—never leave them unattended in a car or at a café table.

  3. The Charging Trap: Avoid using public USB charging stations (like those in airports). Use your own “wall wart” or a portable power bank to avoid “Juice Jacking,” where hackers steal data through the charging cable.

April Checklist

  • Audit Your Settings: Go into your phone’s Wi-Fi settings and “Forget” any public networks you no longer need.

  • Update Your VPN: Ensure your company VPN client is updated to the latest version this week.

  • Grab a Webcam Cover: Stop by the IT desk to pick up a branded webcam cover to ensure your privacy while working remotely.

Symbol Security

Ready to Implement This Month's Security Focus?

Deploy automated security awareness training with Symbol Security. Schedule simulations, track progress, and measure improvement across your organization.