How To Avoid the Bait of Phishers

When it comes to cyber security attacks, by far the most common is that of phishing. This form of attack is performed by criminals who acquire sensitive or personal information from victims through the use of deception. Hundreds, if not thousands of emails will be sent out to unsuspecting recipients, and made to look as if they have been sent by a reliable source, for example a bank or some other trusted organsiation. In reality this is a rouse in order to gain access to your confidential data, such as usernames, passwords or credit card details, or, failing that, they may instead look to utilise your mail server and send emails to your contact list.

Why Using Third Party Firms is a Risk to your Data

When it comes to digital security, the use of third party firms to supply you with IT solutions is generally a risky option. A third party firm is anyone who you pay to supply IT services, and that has access to your data. You may rely on a company to store certain documents, for example. The risk here is that your data is exposed to their system administrators to view, share and, should they choose to, sell. This potentially valuable data could find its way into the hands of your competitors, and cause irreparable damage.

2016 Cyber Predictions

2015 saw a record level of cyber attacks, of all kinds, ensuring that the issue of cyber security will remain firmly at the top of many Boards agendas. Colin Tankard, Managing Director of digital security company Digital Pathways, outlines his predictions for 2016 when it comes to new or increased threats to look out for.

The Dangers of Software As A Service

The cloud is a fantastic piece of ingenuity. The ability to store huge amounts of data away from your machine creates a wealth of space, as well as ensures that your documents are accessible from anywhere on the globe. The cloud as a concept is a brilliant one, and gives companies the ability to sell software as a service. Rather than simply sell a customer a storage device, they are able to instead charge an ongoing rate. Big industry names, such as Salesforce and Sage, are such big hitters in the market thanks in part to their ability to utilise the cloud to create a more seamless experience. Everything about the cloud seems to work. Everything except its security.

Viewing Digital Security like Health & Safety

In digital security terms, 2015 has been the year of the major corporation hack. With Ashley Maddison in September, Carphone Warehouse in August and now TalkTalk, Weatherspoons, VTech and Marks and Spencer all in the past month, yes, 2015 really has been an incredible year for highlighting the ineptitude and naivety with which the companies we trust hold our personal data. Despite how things seem though, these ‘leaks’ may actually be a blessing in disguise and good news for individuals, as well as bad.

The Impact of Hacking on TalkTalk

When a cyber-attack hits a major, national company, the affect it has is obviously widespread. TalkTalk are one of the more recent cases were a data leak has created scandal in the media and, more importantly, severely impacted on people’s lives. The attack is likely to cost the company up to £35million, with 157,000 customer’s having suffered from their personal details being leaked, from addresses and phone numbers, to bank accounts and sort codes.

The Professional Risks of Webcams

Whether it is the risk of using a webcam in a personal capacity, or the potential business repercussions, it is vital that people begin to realise the dangers involved with built-in camera devices. We looked at certain aspects of this in our previous post, Protection from Webcam Hackers, where stories of couples getting caught out in bed and baby monitor footage being streamed elsewhere were the key concerns we covered. As well as risks from a personal perspective, there are also risks to you professionally as well, both in terms of your data security and the streaming of compromising images.