Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

Home network safety tip: keep most devices on the “Guest” network

Home network safety tip: keep most devices on the
Malware from the manufacturer means bad times for everyone

It would be great if the stories of products sold by major retailers with baked-in malware were relegated to decades past, but the issue hasn't gone away. The Electronic Frontier Foundation reports that a low-budget kids tablet by Dragon Touch was sold on Amazon for the better part of a year despite having possible malware preinstalled from the factory.

There really is no clear and obvious way to prevent any instance of factory malware, but one thing that could help quite a bit is to keep your networks separate.

This is an example of a router with guest network functionality built in.
(See online!)

Many home routers these days offer "guest networks" which are intended to let houseguests or visiting friends access your Internet without exposing your home computers and files. It's convenient and easy to set up along with your normal network. But the best part is that you can use the same trick to keep untrusted devices away from your important data!

You'll need to look in the manual, instructions, or a handy Youtube video if you need help for your specific router (or buy a new one if your current one doesn't support it), but, once configured, it's simply a matter of asking: "does this device/thing need to connect to my home computers or backup systems? If "no", put it on the guest network!

Bottom line, you might have several computers and maybe a printer/scanner on your home network for file sharing or backup purposes, but why let the Playstation or Echo in the same space? They can still access the Internet on the Guest Network and that's really all they need

Moving forward, always put phones, tablets, and any other device stays segregated on the guest network where, if they become infected, they can't damage your real computers and important data.

Tags: ,

Share This

Have a Comment or Question?

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

passwords Tutorial
|INDEX|next: Password Tips and Tricks

Making Good Passwords

To understand what makes a good password, let's talk about what makes a bad one first.
Making good passwords can be complex, but here are some tips and tricks that will make it easier.

Password Protection

Once you've taken the trouble to make a good password, the next step is to keep it safe!
Now that you've done all this work, you have to learn the most important rule of all: DON'T GIVE THEM AWAY!

... or check out any of my other guides and tutorials by clicking here!

Bad Passwords

To understand what makes good passwords, first check out some of the worst passwords out there and what makes them so bad.

[Click for full description]

Password Tips and Tricks

It's impossible to expect someone to make good passwords by just giving them some rules. There are tricks that make your passwords secure and easy for you all at the same time.

[Click for full description]

Password Protection

It's really a skill to come up with secure passwords that you can remember. Once you've learned how, remember that it doesn't matter how good you are if you don't protect your password properly.

[Click for full description]

Password Mugging

A disturbing new practice among websites and services is where they ask you for your user name and password to other sites. I call this "Password Mugging"

[Click for full description]