Five tips to avoid Black Friday and Cyber Monday scams
The frenzy of Black Friday and Cyber Monday generates billions in sales each year, but the frenzy also attracts cyber criminals. Whether you are running…
National Computer Security Day (November 30th) raises awareness of the importance of cyber security and the fundamental need for everyone who uses and owns a computer to know computer security basics.
The day was created in 1988, after the first significant cyber attack on the internet’s predecessor, ARPANET. The first internet worm spread to roughly 6,000 computers (out of only 60,000 connected to ARPANET at the time!). It caused large portions of the network to become disconnected to prevent the virus’s spread. Although the vulnerabilities exploited by the worm were against systems that aren’t seen on the internet today, the accounts it attacked and the methods it used are still used by modern-day hackers, which looked for accounts with obvious passwords, such as those found in a short dictionary list or those who used the account name as the password.
The internet of today is almost unrecognisable from its 1988 predecessor. Now, every device we own is connected, and almost every service you could ever need can be accessed online. Having a public-facing space on the internet is necessary for businesses now, and getting your brand out there is as easy as creating a social media page.
However, our ever-increasing reliance on the internet is matched with an ever-increasing risk. The few businesses on the early internet generally only had one or two devices to protect, which starkly contrasts with the massive task organisations today face. Today, an office network is expected to have an internet-connected device for every employee, running a website and holding almost all business-related data on a computer or the cloud. Many businesses today cannot run without a connection to the internet, and an attack on a critical online service can significantly disrupt your operations.
The large number of organisation devices and services which require protection can quickly become overwhelming – it was almost more effortless when only a device or two were connected!
If you’re unsure where to start when protecting your devices and data, the best way to begin is to map out what you have. Listing all your devices, software, and where data is stored will help you understand what you need to protect first. Don’t forget third-party services too; from your email provider to social media accounts, any third party that stores or processes your data should be included in your list.
Now that you have a good idea of what devices and software you use, identify which ones are most important to you or your organisation. Think about what would happen if a specific software became unusable or suddenly unable to access data held on a particular device – how would that affect your organisation’s ability to operate as usual? Additionally, think about the data and services the users on your network have access to and what would happen if one of those accounts got hacked. Would an attacker be able to access sensitive data if they successfully compromised an account? Knowing which software, devices, and data are most important to your organisation means you can get to work protecting it!
Some simple practices within cyber security can help protect any device or software. Following these on every online service you use can quickly improve your organisation’s security:
These steps can quickly take your online world from unsecured to protected, and most only require a look through an account’s settings or a change to how you create passwords.
While the internet is a great asset to society, it also comes with problems that previously could never have existed. The internet in 1988 did not have phishing attacks, scammers, or malware to anywhere near the extent the internet does today. Because of this, knowing the risks and how to protect yourself against these threats is more important than ever.
Phishing attacks are the first step in most attacks against businesses today and are one of the most prolific forms of attack on the internet. Of the organisations that have identified a breach or attack, 83% were from a phishing attack, according to the UK Government’s 2022 Cyber Security Breaches Survey.
Knowing how to spot a phishing attack is one of the best human-level defences you can have. Many phishing attacks come via email, but you may also see them in direct messaging platforms like text or social media.
The following techniques are typically used in phishing attacks:
Phishing attacks may also be specifically targeted at you or your business. These attacks, known as spear phishing attacks, can be harder to spot and are designed to look like genuine business correspondence. They may ask you to fill out a form or approve a financial transaction but will typically have many of the same features as a phishing attack, such as a suspicious or misspelt email name.
Staying safe online also includes keeping your identity safe from cybercriminals and identity thieves. As social media use has skyrocketed in recent years, many threat actors have begun to take advantage of the trust users give their online information. Many phishing attack campaigns have been created because of this, alongside scams that impersonate popular influencers or brands.
Keeping your identity safe online can be done quickly by following some of these steps:
Consider if your social media accounts should be set to private or public – while posting on social media is fun, remember that public accounts on most sites can be seen by everyone, from your friends to your future employers and even malicious users. Take time to consider whether you are happy for your content to be in the public view – if not, consider setting your profile to private or creating a new account just for your family and friends to follow.
Most major social media sites allow for accounts to be set to private, and the following links explain how to change the privacy settings for each website:
Everyone can see public accounts, and search engines make finding information about someone incredibly easy. Cybercriminals take advantage of this and can easily target someone sharing their day-to-day life online.
Before you post, think about what information you are sharing and if you want the whole world to know it. For example, posting a photo of your kids before their first day at school is a great way to share the moment with family and friends, but consider that the photo may include your house name or number, the logo and the name of the school your kids go to, and what the front of your home looks like – information that you probably wouldn’t want an online stranger knowing! Posts like these are best shared on private accounts or through direct messages.
The rise in social media use has been matched by a rise in social media scams. Cybercriminals take advantage of the trust users place in other users online and have created scams that fit in perfectly with the posting culture of the site they are using.
Some things to keep in mind while online:
If you are concerned that an account is posting links to scams, the easiest way to help prevent anyone else from becoming a victim is to report profiles or content and then block them. If you suspect an account belonging to a friend or family member has been hacked, message them privately on another website or text to tell them so.