Connected Consumer Security: Part 3 – Cybersecurity Habits to Stay Safe

Connected Security-part 3
Connected Security-part 3

April 22, 2021

Useful Information at Your Disposal

  • Dashboard: The Home Network Security (HNS) Dashboard provides a quick overview of all the monitoring and security functions of Home Network Security, showing the security status of all the connected devices on your home network. It informs you when a vulnerability is found, remote connections or web threats were blocked, and when devices show unusual network activity or events that triggered any Parental Control rules that you’ve set. Using the Dashboard, you can review the HNS Summary protection results in the Security, Parental Controls, Family Members, Top Attacked Devices, and Network Usage panels.
  • Reports: Trend Micro Security offers a Security and Root Cause Analysis Reports.
    The Security Report provides details of the activities done by TMS in your computer. You can use it on-demand or review it on a monthly basis
    • Security Threats: Shows the number of ransomware, computer viruses, suspected spyware, unauthorized changes, web threats, and suspicious access attempts discovered during the selected period.
    • PC Health Checkup: Shows the space recovered, startup time saved and the privacy data safety confirmed. It also includes a check for potentially incompatible programs.
    • Parental Controls: Shows the website categories and websites most often blocked for the selected time period.
    • Browser Passwords:  Shows the total number of browser passwords protected by Password Manager and their overall password strength. In addition, it tells you the number of passwords saved in your browsers which is a privacy risk. These should be put into Password Manager, then deleted from your browser.

  • Timeline: Provides a handy list by date of all issues discovered by Home Network Security, letting you monitor or take action to address them. You can filter the menu by issues: Show All, Security, Parental Controls, Connections, Action Required, or System which allows you to display the Issue Details and the Recommended Actions to obtain instructions for what you can do to address the problem.

A Few More Reminders

  • Be consistent in performing backups of your system and data. Once the backup has completed, make sure that the device is disconnected from your home network or computer and stored in a safe place, ideally off-site.
  • Ensure your applications and devices have been updated with the latest patches and firmware.
  • Take caution when clicking directly on links in emails or when opening attachments, even if the sender happens to be someone you know, and even if you have an antivirus program running on your system.
  • Disable Auto Run and Auto Play features on your computer to prevent portable media from automatically running malicious programs on your computer, or ensure that the option “Prevent programs on portable drives from running automatically” is enabled in Trend Micro Security.
  • It’s always best to invest in a good password manager to create strong passwords that can be changed regularly.
  • It’s a best practice to use Two-Factor or Multi-Factor Authentication when available.
  • Be suspicious of unsolicited phone calls, email messages, websites or apps asking for your personal identity data.

Final Thoughts

You Might Also Be Interested In