Unknown callers and self-googling
November 2018, Cyber Security
Ask most security experts and they’ll tell you that their number one rule for phone calls: Unless the caller is a saved contact in your phone, don’t answer. Hackers use many tricks to attempt to record your voice or lure you to answer certain questions through a phone call. Instead, allow unknown callers to leave a message and you decide if you want - or need - to call back.
If you aren’t among the curious few who already do this regularly, Google your name every now and then to see what the world knows about you. You may be surprised at the amount of information about you. Don’t look only at the first page of search results — look through several pages to see what is known about you.
Google your name along with a keyword. For example, search for your name and your employer or school, and see the list of things that you either have participated in or have been identified with, as well as what someone else has shared about you. Hackers use this information to figure out things about you. This way, they can use targeted attacks to gain access to your personal information.
Here is an example. Let’s say you are listed as a Xerox employee on your LinkedIn profile. With very little research, a hacker can figure out when the Xerox benefits open enrolment occurs. With that information, they may target you during the company’s open enrolment period with phone calls or email, asking you to log into seemingly harmless sites. If you are not careful, you may enter the wrong site and submit your secure credentials.
For more information contact Tanya Moodley, Bytes Document Solutions, +27 11 928 9111, firstname.lastname@example.org
- Managing who, what and why
November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security
Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.
- Physical/logical convergence
November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
- Using tomorrow’s tools to solve today’s security problems
November 2018, Access Control & Identity Management, Cyber Security, Integrated Solutions
It is the companies that are already investing in tomorrow’s tools to solve today’s problems that will survive the ongoing onslaught to circumvent security solutions.
- NEC XON talks Industry 4.0 and disruption
November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, Conferences & Events, Training & Education
NEC XON held its seventh annual summit at Sun City in October this year in which it focused on the Fourth Industrial Revolution (IR4) and how it would disrupt the status quo.
- Our dependence on cyber-connectivity
November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Government and Parastatal (Industry)
The health, safety, security, economic well-being of citizens, effective functioning of government and perhaps even the survival of the industrialised world relies heavily upon interconnected critical systems.
- How close has video analytics grown to AI?
November 2018, Technews Publishing, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
Hi-Tech Security Solutions asks how far artificial intelligence has changed the video analytics market and how it will make an impact in future.
- Digital forensics is crucial to the security chain
November 2018, Cyber Security
Forensics involves the application of forensic tools to recover, scrutinise and analyse masses of data and logs to uncover what has happened.
- The risks of social media
November 2018, AVeS Cyber Security, Cyber Security
Employees, their social media profiles and the devices they use to access a company’s network and resources provide a plethora of gateways into the infrastructure for cyber criminals.
- The need for resilience in national infrastructure
November 2018, Government and Parastatal (Industry), Cyber Security, Security Services & Risk Management
The industries and infrastructure on which so much of our daily lives depend are deep in the midst of mass digitisation.
- Protecting constantly connected users
November 2018, Products, Cyber Security
The latest versions of ESET security products offer multi-layered protection, enhanced IoT protection, product referral and a new security report feature.
- Blockchain explained
November 2018, IT infrastructure, Cyber Security
Blockchain: What is it, how it works and how it is being used in the market? A closer look at the technology that is rapidly growing in popularity.
- J2 launches Home Secure
November 2018, J2 Software, News, Cyber Security
J2 Software has announced the launch of J2 Home Secure, aimed at protecting home/personal users from online fraud and cyber threats.