* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [未分類](https://www2.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr) * 八大資安自保方式 即使「在家工作」也能遠離網路詐騙... # 八大資安自保方式 即使「在家工作」也能遠離網路詐騙 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2020%2F05%2F8-tips-working-from-home%2F%3Flang%3Dzh-hant) [](https://twitter.com/share?text=%E5%85%AB%E5%A4%A7%E8%B3%87%E5%AE%89%E8%87%AA%E4%BF%9D%E6%96%B9%E5%BC%8F+%E5%8D%B3%E4%BD%BF%E3%80%8C%E5%9C%A8%E5%AE%B6%E5%B7%A5%E4%BD%9C%E3%80%8D%E4%B9%9F%E8%83%BD%E9%81%A0%E9%9B%A2%E7%B6%B2%E8%B7%AF%E8%A9%90%E9%A8%99&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2020%2F05%2F8-tips-working-from-home%2F%3Flang%3Dzh-hant) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2020%2F05%2F8-tips-working-from-home%2F%3Flang%3Dzh-hant&title=%E5%85%AB%E5%A4%A7%E8%B3%87%E5%AE%89%E8%87%AA%E4%BF%9D%E6%96%B9%E5%BC%8F+%E5%8D%B3%E4%BD%BF%E3%80%8C%E5%9C%A8%E5%AE%B6%E5%B7%A5%E4%BD%9C%E3%80%8D%E4%B9%9F%E8%83%BD%E9%81%A0%E9%9B%A2%E7%B6%B2%E8%B7%AF%E8%A9%90%E9%A8%99&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2020/05/8-tips-working-from-home/?lang=zh-hant&ts=markdown) \[\](mailto:?subject=八大資安自保方式 即使「在家工作」也能遠離網路詐騙) Link copied By [Unit 42](https://www.paloaltonetworks.com/blog/author/unit-42/?lang=zh-hant&ts=markdown "Posts by Unit 42") May 11, 2020 1 minutes [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) 受到全球COVID-19的影響,前所未見的大量企業正在加速遷移雲端基礎架構以便於遠端工作。大眾對於病毒相關新聞的關注,也給了駭客這個機會,透過針對COVID-19相關議題進行網絡釣魚活動。 Palo Alto Networks威脅情報小組Unit 42在過去90天裡(1月30日至4月30日),觀察到三個SilverTerrier(來自奈及利亞的網路駭客組織)發起一系列以COVID-19為主題的10個惡意軟體活動。這些活動產生了超過170個網絡釣魚郵件。以台灣的數據來說,已知的分別是危險網域[covid-19.apea2019.scalacube.xyz](http://covid-19.apea2019.scalacube.xyz/)(IP位址:54.39.141.121)以及惡意軟體[cpcontacts.covid19diag.com](http://cpcontacts.covid19diag.com/)(IP位址:43.254.18.7)。 雖然聽起來很陰險,有些人利用災難及危機當作機會,在完全不顧及道德的情況下尋求經濟利益。大量證據顯示,台灣和全球範圍內的網路攻擊急劇增加,Covid-19被用作非法獲取不正當收益的手段。 這些證據包括過去幾週內已註冊的100,000多個新網域,其中包含「covid」、「 virus」、「corona」等單字以及過去幾週的其他單字。儘管某些網域名稱可能是合法的,但這些新網域很可能相互關聯,並成為散播惡意軟體給毫無戒心的訪客的手段。 Palo Alto Networks建議,在家工作的數百萬人必須在辦公室採取安全措施。在當前急需有關COVID-19即時資訊的情況下,相較於安全性要求較高的辦公場所,在家工作的人更容易受騙。 以下是八種在家工作時資安自我保護以免受到網路攻擊的方法: **線上搜尋** 駭客會利用網路搜尋及社群媒體的關鍵字搜尋,置入導向惡意軟體或充滿廣告的連結。因此Palo Alto Networks建議在防毒軟體上允許或啟用網站過濾,或者使用受信任的媒體網站上獲得訊息。 **線上遊戲** 若與家人共享裝置,常見使用者與家人共同使用同一裝置,並以網路連接公司伺服器,或是用於線上遊戲等個人活動。由於WFH指令、檢疫隔離/自我隔離、學生在家學習等原因,發現線上遊戲網站流量大幅增加;因此,駭客會經常在第三方網站上投放受惡意軟體感染的應用程式,Palo Alto Networks建議使用者只從Google Play和Apple商店下載應用程式,以維護安全。 **視訊會議** 視訊會議的資安威脅,例如會議炸彈、惡意聊天連結及未經授權的與會者,只需幾個步驟,即可阻擋潛在的威脅攻擊。這些步驟包括啟用密碼、查看隱私設定、開啟通知當有人加入時收到通知、關閉「在主持人之前加入」功能等。不論使用哪種視訊會議工具皆必須遵循辦公室安全措施。 如果想與朋友進行虛擬聚會,最好使用個人智慧型手機,筆記型電腦或其他裝置。不管是視訊會議軟體或任何應用程式一樣,請確保使用的是最新版本並使用該應用程式中包含有安全功能的軟體。 **物聯網** 冰箱、電視及其他家用電器可以連接到網路的時代,這也再次為網路駭客提供了更簡便的攻擊手法。由於創造物聯網時很少考慮安全性,因此在購買時更改密碼很重要。聽起來或許微不足道,但是如果智慧型冰箱被遠端關機或是智慧型電視在未經授權的情況下切換到付費頻道,該怎麼辦? **虛擬私人網路** 人們非常關注業務連續性計劃,卻很少關注家庭到企業網路的連接。家用路由器已經連接到網路服務供應商,而安裝了很長一段時間的軟體通常都已過期。這使家用路由器非常脆弱,一個簡單的解決方案是確保已更新至最新版本並更改密碼。上次檢查路由器是否需要更新是什麼時候?現在是一個檢查的好時機,因為網路駭客知道使用者正在家工作。 **網路釣魚** 透過網路釣魚竊取訊息是台灣的一種常見攻擊手法,因為它涉及大量發送或特製的個人電子郵件/訊息。例如,這些訊息利用市場行銷技術吸引使用者註冊資料以獲得Covid-19相關的新資訊,並鼓勵使用者點擊導向惡意軟體的連結。確保透過公司防火牆登入工作電子郵件,並防備免費提供的任何內容(無論是透過電子郵件、聊天應用程式、社群媒體等)。請防備電子郵件,並在點擊之前務必三思,因為網路駭客會趁使用者在家工作降低戒備時,趁虛而入。 **線上詐騙** 線上購買產品並寄送至海外,因供應短缺而有迫切需求的人,也是容易遭網路詐欺利用的一種狀況。在很多情況下(包括海外政府採購部門)迫切需要PPE裝置的醫療保健提供者相當容易受到詐騙。Palo Alto Networks建議只在受信任的線上零售商或平台上購物。 **雲端** 由於雲端在傳送軟體服務中扮演著重要角色, Palo Alto Networks建議請資訊科技部門員工一起檢查,企業防火牆基礎架構是否正在使用威脅情資,以查看進出網路的流量。這意味著在使用公司網路時,家庭裝置就能免於受到攻擊。 網路詐欺不會停止攻擊。他們的作案手法是整天手動或自動搜尋、選擇並詐騙目標對象。如此大規模的危機對他們而言是大好機會,他們也對受害者漠不關心。然而,在遵循上述建議、擁有危機意識,並且有頂尖技術支持的情況下,有助於打擊網路犯罪者。每次成功阻止或舉報試圖詐騙的事件,都有助於提升針對使用者訊息的保護力。 *** ** * ** *** ## Related Blogs ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### Strata Copilot - 加速邁向自發性網路安全性的未來](https://www2.paloaltonetworks.com/blog/network-security/introducing-strata-copilot/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 醫療企業是勒索軟體攻擊者的首要目標](https://www2.paloaltonetworks.com/blog/2021/10/healthcare-organizations-are-the-top-target/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 適用於 5G 的零信任:實現安全的數位轉型](https://www2.paloaltonetworks.com/blog/2021/10/zero-trust-for-5g-digital-transformation/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 網路攻擊鎖定金融服務企業的 3 個原因以及防禦方式](https://www2.paloaltonetworks.com/blog/2021/10/financial-services-cyberattacks/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 連續 7 年提供出色的客戶服務](https://www2.paloaltonetworks.com/blog/2021/10/delivering-outstanding-customer-service/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### Palo Alto Networks 研究:61% 的企業難以確保在家工作的遙距網絡安全](https://www2.paloaltonetworks.com/blog/2021/09/state-of-hybrid-workforce-security-2021/?lang=zh-hant) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language