Cybersecurity is not hype

June 2018 News & Events

Regular readers of Hi-Tech Security Solutions will know that we have upped the amount of content we have about cybersecurity, whether it is aimed at the physical security market or not. This is not some attempt to appear ‘with it’ in an age where we all hear about cyber-attacks on an almost daily basis, but something that is very necessary.

When you read something about the ‘always connected’ world we live in, you probably roll your eyes. We’ve been hearing that for years and we all know that we are connected and whatnot. It’s a bit of a boring cliché these days.

But it’s not. We really are always connected and always online, even when we think we’re not. There are cybersecurity issues we all have to deal with on a daily basis, whether as an individual, a family or a business. And while the headlines get excited about the big data breaches, the real threats are often overlooked.

It’s really hard to break into a bank’s internal network, even for very experienced hackers. Similarly, the large enterprise companies generally (we hope) have their cybersecurity under control. But their suppliers, the small and mid-range companies are not in the same boat, and cybercriminals – like burglars, rapists and murderers – will focus on the easiest target that enables their crimes.

So a small supplier to a bank may have limited access to the procurement application of the bank, perhaps via a web browser, but that is enough. A good cybercriminal will target the small company with limited cybersecurity – maybe a firewall and antivirus on its computers – and weasel its way into the bank’s system after infecting and gaining access to the small company’s network.

Perhaps it could gain access to the small company’s network by sending a phishing email, or by attacking one of the employees via their smartphone – who doesn’t connect their phones to their employer’s Wi-Fi network? Perhaps that specific employee has kids who like playing games or signing up for every new app or game on social media? One bad click and they are compromised and soon their parents will be as well.

And yes, I’m a nobody and you wouldn’t make a fortune hacking me, but if you can get into my company through me there’s more to be had. And if you can get into a bank through my company, the returns would be worth the time and effort.

The point is not that you should never make a mistake and be paranoid, but that we are all connected and some people are making use of that connectivity to get personal information that can be used for crime and fraud. And the worst is they will probably get away with it.

An executive of a ‘white hacker’ company told us recently that they had caught the same person involved in scamming banks three times already. This individual was never prosecuted because there was no way the NPA could present evidence and make a case. So he’s at it again and maybe he’s the one sneaking around in your network to get the passwords you use to make bank payments?

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
Directory of suppliers
Technews Publishing SMART Security Solutions Fire & Safety
The Directory of Product and Solution Suppliers for the fire safety industry includes details of companies that provide security and risk mitigation products, advice, and services within this market.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
IZI Group acquires G4S Cash Solutions South Africa
News & Events
IZI Africa, a sister company within the IZI Group, has acquired G4S Cash Solutions (SA) following the receipt of all necessary regulatory approvals. This transaction marks a significant consolidation in the South African cash handling industry.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.