The return to class in almost all Italy allows you to make the point with the Aulab Pmi on the safety and efficiency of communications, useful for both distance training, but also for smart working.
The pandemic events, Aulab recalls, have only accelerated a process already in progress: from Dad to all kinds of courses that have moved online, the number of students in e-learning mode has increased dramatically; moreover, by
The Ten Aulab Advices for Dad’s Security
Just to help users, Aulab has compiled 10 tips to put into practice to surf daily safely.
Create on the computer used in the family a user specific for the student, activating all filters available to your device. For example, you can ban the possibility of installing new applications, so that only useful and safe applications can be enabled.
Refresh your software constantly to fix any bugs or security flaws of your operating systems.
Frequently update the network router software to fix security flaws.
Change the admin password of the network router or other connected devices. Access to the router with default credentials can allow you to get a knowledge of the activities you are doing on the network.
Be wary of e-mails and phone calls where the interlocutors declare that they possess specific personal information. They may have obtained them by tracing the activity or information shared on social media.
Use a password manager that generates passwords randomly. For example, the one provided by Google Chrome is an ideal tool, but it is advisable to protect Google’s access to the most biometric system (such as fingerprint or Face Id) or 2FA, i.e. two-factor authentication
Set authentication to two factors (2FA), requiring the sending of a security SMS message when accessing certain accounts, or using specific apps available on smartphones.
Be cautious when using public Wi-Fi networks: the higher the risk of hacker attacks. This may be why it is important to activate a VPN service that helps maintain a constant and complete encryption of information.
Pay attention to software installed on your computer: some are only used to steal information while others may be a vehicle for the notorious Ramsonware, i.e. software for the computer-sequestrian data for which a ransom may be required later.