Connected Consumer Security: Part 3 – Cybersecurity Habits to Stay Safe

Connected Security-part 3

April 22, 2021

Knowing your adversaries and how they attack is sometimes not enough to win the battle. Strategy and good security habits are needed to conquer the enemy. Here we provide that strategy and a set of best practices to help keep your home and devices secure.

Useful Information at Your Disposal

Trend Micro Maximum Security (TMS) for Windows Reports and Trend Micro Home Network Security’s (HNS) Dashboard, Timeline, and Reports provide a wealth of information to help you comprehend the security posture of your devices, privacy, data, home network, and household.

  • Dashboard: The Home Network Security (HNS) Dashboard provides a quick overview of all the monitoring and security functions of Home Network Security, showing the security status of all the connected devices on your home network. It informs you when a vulnerability is found, remote connections or web threats were blocked, and when devices show unusual network activity or events that triggered any Parental Control rules that you’ve set. Using the Dashboard, you can review the HNS Summary protection results in the Security, Parental Controls, Family Members, Top Attacked Devices, and Network Usage panels.
  • Reports: Trend Micro Security offers a Security and Root Cause Analysis Reports.
    The Security Report provides details of the activities done by TMS in your computer. You can use it on-demand or review it on a monthly basis
    • Security Threats: Shows the number of ransomware, computer viruses, suspected spyware, unauthorized changes, web threats, and suspicious access attempts discovered during the selected period.
    • PC Health Checkup: Shows the space recovered, startup time saved and the privacy data safety confirmed. It also includes a check for potentially incompatible programs.
    • Parental Controls: Shows the website categories and websites most often blocked for the selected time period.
    • Browser Passwords:  Shows the total number of browser passwords protected by Password Manager and their overall password strength. In addition, it tells you the number of passwords saved in your browsers which is a privacy risk. These should be put into Password Manager, then deleted from your browser.

The Root Cause Analysis Report maps the root cause and triggering event/s in graphic format using Process, Website, File, Library, and Group icons to show you the items involved in the infection chain. With this report you can analyze the source of infections, so you can help prevent them in the future.

  • Timeline: Provides a handy list by date of all issues discovered by Home Network Security, letting you monitor or take action to address them. You can filter the menu by issues: Show All, Security, Parental Controls, Connections, Action Required, or System which allows you to display the Issue Details and the Recommended Actions to obtain instructions for what you can do to address the problem.

Understanding the information presented by these tools will assist you in figuring out the security flaws and vulnerabilities your devices and home network have, while guiding you on how to strengthen your protection.

A Few More Reminders

  • Be consistent in performing backups of your system and data. Once the backup has completed, make sure that the device is disconnected from your home network or computer and stored in a safe place, ideally off-site.
  • Ensure your applications and devices have been updated with the latest patches and firmware.
  • Take caution when clicking directly on links in emails or when opening attachments, even if the sender happens to be someone you know, and even if you have an antivirus program running on your system.
  • Disable Auto Run and Auto Play features on your computer to prevent portable media from automatically running malicious programs on your computer, or ensure that the option “Prevent programs on portable drives from running automatically” is enabled in Trend Micro Security.
  • It’s always best to invest in a good password manager to create strong passwords that can be changed regularly.
  • It’s a best practice to use Two-Factor or Multi-Factor Authentication when available.
  • Be suspicious of unsolicited phone calls, email messages, websites or apps asking for your personal identity data.

Final Thoughts

While being connected is an essential way of life in the modern world, it’s vital to be aware of the risks and threats it potentially poses to us as consumers, be it inside or outside the home. Using Trend Micro’s multi-layered consumer security solution, along with sound cybersecurity habits, will go a long way toward keeping our home, our devices, and family secure as we go about out digital lives. Know how to maximize the security features and reporting tools of your security software and home network security device.

Be informed. Read the Product Guide or contact Technical Support if you have any questions:

Connected Consumer Security: Part 1 – The Threats We Face 

Connected Consumer Security: Part 2 – Making Your Digital Life Safe with Trend Micro

You Might Also Be Interested In