Cybercriminals can be anyone they want when communicating on social media. All they need to know is who your contacts are, how you know each other and then they embark on their attack. While you think that you are talking to Jade Pops, you’re actually talking to a person you have never met before. Jade’s profile is just being used as a front to get close to you.
Our lives revolve around technology. We send instant messages via WhatsApp. Our thoughts and carefully composed photographs are shared via Facebook, Twitter and Instagram. We ask Siri to find the best route home and Alexa to remind us to get milk, bread and speckled eggs.
Welcome to Cybersecurity Month 2019. Every year, we dedicate the month of October to raising awareness about information and cybersecurity-related matters, by providing you with guidance on how to avoid becoming a cybercriminal’s next target.
Cybercrime is on the rise and higher education institutions continue to be at high risk of being attacked not only for their data, but also for their IT infrastructure, which if accessed, can aid cybercriminals with their illegal activities.
Compromised user accounts, stolen devices, virus/malware infections and data losses have become the norm across the world. The media are constantly reporting on security breaches where millions of user accounts have been accessed and data stolen or leaked. There have even been instances where companies and institutions have had to pay ransoms to get their information back.
Every time we use our mobile device, or do something online, we could be unknowingly sharing data about ourselves. Millions of people use their mobile devices daily to perform tasks, or go online to work, socialise and do research. However, many don’t realise that in some instances their actions, or devices, including household items that are connected to the internet, are being recorded. This then leads to their data being stored and accessed by third parties.
Once a cybercriminal identifies its next target, they then go about doing as much research about this person as they possibly can to personalise the attack. They will view the victim’s social media accounts, LinkedIn profile, and information made available via the entity’s website. Additionally, they will find out who the employees and business partners are that they are regularly in contact with to make the attack seem legitimate.
There is a common misconception that home security networks will never be targeted by cyber criminals, because they are too small. Unfortunately, in many cases cyber criminals do not target individuals, they target networks that are easy to access.
Smartphones have become a one stop shop everything that we do. We use it to make online purchases, manage our bank accounts, keep track of email, and get the lowdown on what’s happening on Instagram, Facebook and Twitter.
Accessing the internet has become such an intrinsic part of our lives, that barely a day goes by when we’re not using it to access information, a service, or simply to connect with others. It has made the world a smaller place, by ensuring that people can connect no matter where they are.
Each year, billions of rands are lost in fraudulent activities across the world. Based on a survey conducted by the Association of Certified Fraud Examiners (ACFE), it is estimated that a typical organisation loses 5% of annual revenue to fraud annually. The findings reveal that the biggest targets for corruption-related fraud are the mining sector, followed by the transportation, oil and gas, manufacturing, and technology fields.