The 12 Days of Cyber Security - The Uncomfortable Truth.

The Uncomfortable Truth.


Organisations and people are very prominent targets for cyber attackers. Almost every piece of technology you use has vulnerabilities that leave it open to compromise.


Very capable cyber-criminals, hackers and others who want to compromise our sensitive information and computer systems.


They may attack an organisations information / systems directly, or via their people.


Anyone at all in an organisation could be targeted. Such is the extent of the threat that no-one should assume they are not a target – especially not if they work with information that is sensitive. And mobile phones, tablets, home computers and other IT devices are extremely vulnerable. They can be protected to a reasonable degree against cyber-criminals, but a determined foreign adversary could easily break into them. And having done so, it is a bit daunting what they could do.


What a determined a cyber-attacker could do to your mobile phone or other personal electronic device:


• Look at, take copies of, or delete all your information.

 

• Eavesdrop on all your conversations.


• Locate your device and you to an accuracy measured in metres.


• Track your movements using your location information.


• Activate the camera and microphone without you knowing.


• Log every button press or lower security levels.


• Infect connected systems (a laptop if the phone is connected via USB).


• Turn the device on when switched off.


All information is valuable and should be protected appropriately.


We must give special protection to information that is classified as sensitive.


But you can do a lot to protect yourself. Here are some useful tips to keep yourself safe:


• Keep your personal information safe by thinking carefully about what you post online and who might be able to see it.


• Don’t post sensitive work or personal information online (especially on open sites or social media).


• Don’t download files you’re not sure about, open email attachments or click on links from addresses you do not recognise.


• Disable Bluetooth, Wi-Fi, and InfraRed, when they are not needed, to prevent anyone connecting to your device without your knowledge. 


• Control your GPS access by turning off location information or controlling which services and apps access it - don’t leave it enabled all the time, e.g. linked to your Facebook account.


• Keep anti-virus software and security patches up to date and switched on.



Reporting 


The advice in this article underscores the necessity of consulting cyber security experts, such as Cybercentry, for addressing any cyber security incidents in both personal and professional contexts. Reporting concerns promptly to the relevant authorities is crucial for a swift response and safeguarding against potential threats.

Back to blog