European Cyber Security Month

ItAdviceAs we put more and more of our live online we all need to be conscious of the risk of cybercrime, a multi-billion dollar “industry” where you budding cyber criminal can simply buy an exploit from an online market place. We have recently see “improvements” to phishing email purporting to be well known organisations we are all using such as Xero, HM Revenue and Customs, eBay and Facebook and banks where the cyber criminals have stepped up their game and made sure a lot of the tell-tale mistakes of the past like bad spelling and grammar no longer appear making these message much harder to detect.

We have also come across instances of vishing – voice phishing, employing social engineering techniques, where a caller has obtained some basic information like the organisation banks with, rung a branch location and asked for the contact in head office accounts to obtain the correct person’s name and then rung up mid-morning just toward the end of a month asked for that person by name, claiming to be from the correct banks online banking security department, said they could see they had logged onto online banking in the last hour (a reasonable assumption based on the time of day) and that they could see other suspicious login attempts and could they confirm for “security reasons” their username and detail of a recent transaction otherwise they would suspend the account their and then… problematic at the end of a month when you need to pay staff and suppliers! Combined with freely available publicly available information they now have the users name, username, account number, sort code, date of birth, place of birth, mother’s maiden name, detail of a recent transaction, home address… quite a scary prospect. Fortunately for the organisation in question the person was on the ball and became suspicious of being asked for information on an inbound call and terminated the call and rang the bank on their publish number… not that this didn’t stop the bank immediately blocking online banking access as a precaution and forcing a change of login credentials with activation details issued out of band by standard mail.

October is European Cyber Security month and the it is well worth remembering the strapline campaigns 2015 STOP, THINK, CONNECT as Cyber Security is a Shared Responsibility.

• If you receive an email asking you to login or change your password never follow the link in the message, always go directly to the website concerned in your browser.

• If you receive an inbound phone call asking for you to confirm details security information take the details of the caller’s name and department and then call back the organisation on their published number such as the number.

• Reputable organisations will never ask for you to confirm personally identifying security details passwords or PIN numbers on an inbound call and not in full on an outbound call so you might be asked for say the third and last character.

• If it sounds too good to be true it probably is

• Never reuse the same password across multiple websites, if you username and password are compromised on seemingly unimportant site

• Growing numbers of websites are moving over to support two factor authentication, either for standard login or for “enhanced security” checks such as changing contact details, resetting passwords, making payments, these can be via text message alerts, rolling one time passwords, authentication apps, if a site asks for you mobile phone number this is often what they want it for… this a compromised list of usernames and password much less useful as you are dependent on not only something you know (a password) but also something you have (a mobile phone, text message, code fob).

If you want further advise on IT security, web and email security and anti-phishing solutions, endpoint security solutions, or cyber security training for your staff please contact our IT Services business Decisive IT Ltd on 03333 44 15 15 or [email protected]

Leave a Reply

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.