Broken security – SOHO routers found to have multiple flaws

Working from home or in small office? Relying on your ISP’s router or a consumer-level one you installed yourself? Sharing files via a NAS? Read this article…:

[…] Jake Moore, cyber-security specialist at ESET, told SC Media UK that if your employees are working from home, the devices the company provides them with, such as laptops and smartphones, will most likely be the most secure.

“But their home routers can’t be monitored, nor are they supplied by or even known about by the company. This is where a huge vulnerability lies,” he said.

“To stay most secure it’s imperative to update all internet-connected devices as soon as patches and updates are released. Default device passwords are notoriously weak (although this is slowly changing) so make sure passwords are in place and are all unique and complex. VPN connections should, of course, be on by default, but many smaller companies I’ve seen don’t always comply with this rule because they do not have the luxury of an IT or cyber-security manager.”

Original article here