Back in February 2020, we began the blog by addressing the security issues of work from home offering some essential tips on security. Sadly we are now facing WFH for an even longer time!
A drastic increase of 250% in SME decision makers saying more than three-quarters of their organization’s full-time employees are now working remotely than prior to March 2020, according to Electric. Coronavirus has accelerated a shift to remote work and introduced a new normal to work style. The new normal will involve employees working more frequently from these less-controlled networking environments like homes.
For the purpose of WFH, more individual users are trying to gear up their own tools – replacing old machines with new machines. According to IDC, there was an increased demand for traditional PC to meet remote work and school needs in Q1 2020. Some users have already replaced the obsolete Windows 7 with Windows 10 as they bought in new machines. However, new machines are not the end of the stories. They may become the beginning of a nightmare if you are not mindful.
Just to list a few default Windows 10 security settings that need your attention:
- Guest account is enabled by default without password protection, resulting anonymous users can use it to access system resources
- Logs and security monitor are not enabled by default, resulting in unable to detect attacks
- Firewall rules are lax by default, resulting many programs can go in out without your consent
- Disk encryption has not enabled by default, resulting people can access information on a misplaced disk or stolen disk, then no one can access any of the information on it