Could’ve, would’ve, should’ve

“I told you so” is an expression that most of you know. For those of you that may be unaware of what it means, it is the dreaded words uttered after the exact negative outcome that someone had told you is going to happen if you followed through with your actions has happened and you are left with a feeling of regret. Basically, they are saying they were right and you were wrong.

This happens often within the Cyber Security world, individuals say they don’t need more security, they have enough and that type of breach will never happen.

Read more: Could’ve, would’ve, should’ve

  • Hits: 446

Convenience – A hacker’s partner in crime

We are all living busy lives, often trading in the safer option for a more convenient one.

Social logins are something that should be considered before implementing.

If you don’t know what a social login is, it is a software sites use that allows you to use the same username and password to get into different platforms.

Instagram has a social login option as seen in the image below, it prompts you to log in through Facebook, this allows you to access Instagram without having to enter your credentials and will keep you logged in as it uses your Facebook credentials to log in automatically.

Read more: Convenience – A hacker’s partner in crime

  • Hits: 462

How safe are your children online?

The internet can be an incredibly fun and informative place, which is what most children view it as. All they know is the gaming and cool YouTube videos at a click of a mouse.

Many are unaware of the risks online.

It has become the norm for younger children to have access to the internet, whether it be through your cellphone, laptop, tablet or their own device.

It is your responsibility as the parent, to inform them about the dangers.

What are you doing to ensure that they are surfing the web safely?

It is impossible to sit by their side each time they want to watch or play something, you need to have security software installed on the device to stop malware from being downloaded through non-certified applications and stop infected links should they be clicked.

Read more: How safe are your children online?

  • Hits: 434

Paying it forward with Cyber Security

I was at a farewell recently and a conversation started when I was asked where I work.
When I said at a Cyber Security company, I got a few confused looks. When I started explaining more around how important it is and how serious the damage can be, interests were peaked.

As I have mentioned in previous blogs and what comes up very often is password management. I asked them whether they have a different password for their platforms?

The first response, to my horror but not my surprise, was that one of the individuals has the same password for their Facebook and online banking. Now I know why they looked so worried when I was saying that if one platform is breached with that password, all the others will be breached too.

Read more: Paying it forward with Cyber Security

  • Hits: 504

Just not interested

I came across a recent article which really made me sit back and wonder why is it that individuals know about the dangers of cybercrime and the types of scams to look out for, yet they do not do anything to prevent it?

The Business Tech article speaks about newly formulated statistics conducted with over 1000 south African internet users and the results are far from reassuring.

It is no use having the knowledge, visibility and resources if you are not going to action it.

One of my biggest worries when looking at stats like this is that there are some of you who are taking all your knowledge, putting it into practice and because there are those who are not doing the same, you could be at risk. Should they be a friend, colleague or supplier.

Third party risk is a big deal and often you can be unaware that those you deal with do not have the right security in place. It has become the norm to have third party vendors at the core of your business, this would mean that they have access to your confidential and sensitive personal and business information. Should they fall victim to a cyber-attack, your information and data will be part of that breach.

Read more: Just not interested

  • Hits: 514

Copyright © 2019 J2 Software