Drone operation does include cyber risks you should understand before you operate your machine.
Most drones operate via a Wi-Fi or Bluetooth connection through your smartphone or tablet. The connection may not be secure, though. A hacker can jam, intercept or terminate the connection or GPS, take over your drone and steal it or crash it into something.
The computer or mobile device you use to operate your drone could become infected with malware. It can affect the connection to your drone and cause the machine to crash and potentially cause physical or property damage.
Access Photos or Videos
A camera attached to your drone can transmit stunning photos and videos from the air. These images are usually transmitted over an unsecured FTP server which a cyber attacker could access and share. This privacy breach is your responsibility.
Ways to Protect Your Drone
Protect your drone from cyber crime when you take several steps.
Ask the seller about their cybersecurity measures.
Most drone sellers include the machine’s cybersecurity information on their website. If you can’t find it, contact the company for additional information.
Test your drone’s security.
Hire a cybersecurity professional to test your drone and ensure it’s safe from cyber threats.
Connect to your drone via radio control.
Use a secure radio control connection since Wi-Fi and Bluetooth connections rely on unencrypted data links that are vulnerable to hackers.
Subscribe to a VPN service.
A Virtual Private Network (VPN) encrypts your internet connection and protects it from hackers.
Install a seL4 operating system.
Equip your drone with new seL4 OS technology. This operating system isolates various functions on the drone, preventing a hacker from taking over your machine.
Install an anti-virus program.
Reduce viruses, malware and other threats when you install protective programs on your computer or mobile device. The most secure programs provide real-time antivirus and anti-theft protection.
Vary your flying habits.
When you fly your drone in the same flight paths and at the same time every day, you make yourself vulnerable to hackers. Instead, vary your flying habits and throw hackers off your trail. Consider flying in remote locations, too.
Purchase drone insurance. Call us.
A drone insurance policy provides you and your drone with important coverage. Look for a policy with:
- Broad, legal and premises liability coverage
- Personal injury and medical expenses
- Hull coverage
- Extra equipment coverage for any on-board cameras, tools and equipment
- Invasion of privacy
Your drone is vulnerable to several cyber risks. Know the risks and how to stop them so you can enjoy your drone and keep it secure.
You and your company can make several preparations regularly to help prevent a cyber attack.
Host an Educational Event
Begin planning an open house, expo, lecture, or other educational event that focuses on cybersecurity. Depending on your company, you may decide to focus your educational efforts on information that will benefit senior citizens, college students or families. For example, your IT specialist could present advice that helps consumers avoid cybercrime, or you could show customers how to implement security protocols on their electronic devices. Get creative as you prepare to raise cybersecurity awareness during an educational event.
Cybersecurity training should occur year-round, but your employees may be especially receptive to security tips during a month that’s focused on raising awareness. Take advantage of this annual opportunity to discuss topics like choosing secure passwords, securing electronic devices used for work and managing email safety. Or choose a different topic based on your unique needs.
Focus on Different Weekly Topics
Some topic ideas include:
- Online safety at home.
- Training for a cybersecurity career.
- Ensuring online safety at work.
- Safeguarding critical infrastructure throughout the nation.
Your company can prepare to discuss these weekly topics during your events, through customer newsletters and on social media.
Utilize Your Social Media Influence
If your company has a large social media following, you have a powerful platform to raise awareness for cybersecurity. You can write blog posts that outline the importance of cybersecurity, share information about how to join the cybersecurity workforce or detail the ways your business protects data. Also, prepare infographs and other visual aids that discuss online safety tips.
Partner with Other Companies
Your company can partner with other businesses as you increase cybersecurity awareness. Share the latest cybersecurity information, create resources that educate the public about cybersecurity or host an online safety seminar together.
Check your Cybersecurity Insurance Coverage
Cybersecurity insurance protects your business in many circumstances. Review your needs with your Scurich insurance agent as you ensure you have the correct amount of cybersecurity insurance for your company.
Consider taking these steps now. They give you the tools you need to raise cybersecurity awareness among your employees, customers and community.
12 months ago ·
by Erin Carlson ·
There is a lot of ‘phishing’ going on these days. As many as one in five people fall prey to phishing incidents, but over 14 percent don’t recognize these phishing attacks. Learn more about phishing and how to combat attacks on your personal or company email.
What is Phishing?
Phishing is a scam that cybercriminals use to gain access to sensitive information. It often occurs via email. The cybercriminal will send you an email that looks official but actually includes spyware, malware or other malicious software. When you open the link or download the file from the email, the criminals can access confidential information like bank account information, your social security number and other data. In many cases, you never know that your information has been compromised.
How to Recognize a Phishing Email
Phishing emails are designed to look authoritative so that you will open them and give the cybercriminal access to your computer. While these emails often look like they’re from a real company, you can usually recognize them via five signs.
- Sender Address
Before opening any email, look at the sender’s address. It may look similar to the official company’s address but could be slightly off. For example, it may use dot-net instead of dot-com or include a small spelling error like micrsoft or micosoft.
Cybercriminals use threats and fear to manipulate consumers. They may say that you will lose money, face criminal charges or suffer another devastating consequence if you don’t open the email. In most cases, these threats are meant to incite fear and get you to comply with their complicit wishes.
Steps That Can Protect Your Email
You can’t prevent cybercriminals from targeting you. However, you can take steps to protect yourself.
- Install spam filters and virus scans.
- Learn to recognize phishing emails.
- Only open email links from verified and trusted sources.
- Delete any emails that look suspicious.
- Train coworkers and associates to recognize phishing threats.
- Purchase cyber insurance that protects you if you are a victim of phishing.
You can’t stop cybercriminals from targeting your email, but you can use these tips to protect yourself and your data.
With data breaches becoming a fairly regular thing, everyone needs to know that they can freeze their credit to prevent identity theft. With a significant data breach, hackers are able to access the names, birth dates, Social Security numbers and addresses of millions of consumers, which put their identity and credit at risk. A credit report freeze is one protective measure Equifax (and other agencies) recommended. Every consumer, including you, should understand this protective measure as you protect your data, identity and credit.
What is a Credit Report Freeze?
A credit report freeze allows you to restrict who can access your credit report. When a freeze is in place, only certain professional entities can see your information, and it’s less likely that an identity theft can access your data.
Ways a Credit Report Freeze Affects You
When you place a credit report freeze on your account, it affects you in several ways.
1. It prevents certain entities from accessing your credit report. This includes potential employers, mortgage companies and car dealers.
2. Existing creditors and any debt collection agencies they hire and government agencies responding to a court order or subpoena may continue to access your credit report.
3. You can continue to access your free annual credit report.
4. It does not affect your credit score.
5. You will continue to receive pre-screened credit offers for credit or insurance. Call 888-5OPTOUT (888-567-8688) or go online to optoutprescreen.com if you wish to stop receiving these offers.
How to Place a Credit Report Freeze
Contact the three nationwide credit reporting companies to freeze your credit report.
To place a freeze, you must provide your name, birth date, Social Security number, address and other personal information. You will also have to pay a fee. It typically ranges from $5 to $10 but varies based on where you live.
How to Know if Your Credit Report Freeze is Successful
After placing a credit report freeze, you will receive a confirmation letter from the credit reporting company. It includes a unique password or PIN you will need if you ever choose to lift the freeze.
How to Lift a Credit Report Freeze
Your credit report freeze remains in place indefinitely. However, you may want to lift it so you can apply for a job or credit. To do that, simply contact the credit reporting company to request a lift. You will provide your password or PIN, pay a fee that varies by state and indicate if you want a temporary or permanent lift.
A credit report freeze can protect your personal data and identity. Consider monitoring your bank, insurance and credit card statements, though, too, and purchase cyber liability insurance as a further protective measure.
With the current COVID-19 pandemic, more people are opting to away from crowds and social situations – and may work from home.
While and employer’s cybersecurity insurance can reduce liability, it makes sense to also implement several security measures in the telecommuting (work-from-home) policy to protect the company.
Use Secure Wi-Fi Networks
Sure, your employees could connect to their neighbor’s wireless network or use public Wi-Fi at a coffee shop. These unsecured networks can open the door for cybersecurity breaches, though. Instruct employees to only connect to secure Wi-Fi networks or provide a safe and secure Virtual Private Network (VPN) for use as they work.
Maintain Security Settings
To protect work-issued devices and confidential data, you may set security settings on the devices you give telecommuters. Remind employees that they should not use a proxy or other method to get around those security settings. Doing so will compromise their device and the company’s data.
From apps to data, everything employees access from their work-issued device should be protected by encryption. This security measure makes it harder for thieves and hackers to steal or access information.
Employees should only have access to essential data and files, not the company’s entire virtual filing cabinet. This limited access protects information and improves security
To get into the device and access various files, employees should use secure passwords. The ideal password contains letters, numbers and symbols, is not easy to guess and is unique to each site. Change passwords at least once a month, too. For additional safety, utilize a two-step authentication process, PIN or token system when logging it.
Prohibit Device Lending
It’s common for telecommuters to let a co-worker or family member use their laptop or phone for a few minutes to check email, play a game or make a call. Discourage this practice since the other person could download questionable content, drop or damage the device, access confidential files, or otherwise compromises the device or security.
Protect Devices from Theft
Leaving a laptop, tablet or phone unattended gives thieves an invitation to steal the device. Remind employees to keep their devices with them at all times and not leave their work devices unattended or in an unlocked vehicle. Likewise, they should take care to secure USB drives and other accessories from theft. You can add tracking capabilities to devices for additional security.
After every work session, employees should log out of the websites they accessed, their Wi-Fi network and their device. This log out procedure protects company data.
Telecommuting is a privilege that benefits your employees and company. Use these security measures to protect everyone.
Modern technology has made it easier than ever for employees to work from home and still remain connected to their place of employment. Using remote employment has actually become a popular trend over the last ten years, especially since selling to the global market has become such an important factor in a business being competitive. Many businesses have found that they can minimize their expenses and attract international customers with more attractive prices if they decrease their overhead by allowing workers to remotely commute.
Despite the many benefits of using remote employees, there are downsides. Many employers considering this trend wonder how they can ensure workplace safety when the employee’s physical workplace is their own home. Another consideration is the degree of employer liability in remote employment.
Fortunately, OSHA has addressed some of the safety issues surrounding remote employment. According to OSHA guidelines, employers are required to maintain a safe workplace, even for employees working from their own home. OSHA will not require an employer to inspect a remote employee’s home worksite, nor inspect it themselves.
However, OSHA may inspect the worksite of an employee that’s performing an at-home job on behalf of their employer if it possibly involves health or safety hazards and there’s a complaint. A record of all occupational illnesses and injuries must be kept on all at-home workers if an employer is subject to OSHA record keeping requirements. Keeping in mind that OSHA compliance measures shouldn’t involve controlling the home worksite of employees, employers might need to take some additional practical measures to ensure OSHA compliance.
As far as safety compliance goes, the absence of immediate supervision for remote workers is one of the main problems employers face. Experienced, highly-trained, long-term employers are generally the worst offenders when it comes to taking safety risks. This group of employees often become complacent due to the fact they’re so accustomed and comfortable with their job, feel they’re familiar with the job’s hazards, and might have escaped disciplinary action when ignoring safety procedures or taking shortcuts in the past.
One of the best ways that employers can counteract the above dangerous attitude toward safety is by using a holistic approach to safety. Employers should focus and place great importance on each individual employee actively participating in the safety process and taking responsibility for their own safety. Whether at home, on the road, or at a remote jobsite, remote employees need to be ready, willing, and able to take the appropriate actions to protect themselves in any given situation.
Employers will need employee support to make any approach to safety successful, which means that employers must have total employee involvement in the safety process. Involve your remote employees in the process of determining what’s needed to prevent injury to themselves and others during remote location work. Most employers find that the experience and firsthand knowledge of their employees is actually very advantageous in creating safe remote worksites.
Remember, employees that understand the value of safety are more likely to be motivated and willing participants. They’re also more apt to embrace safety behaviors for the longevity of their employment. Employers can reinforce their employee’s positive attitude about safety by having electronic or person-to-person safety counseling in place and ensuring safety managers are encouraging safety participation.