Online Security

The Importance of Using Different Passwords

Posted on January 25, 2016 at 9:34 am

We have previously looked at the importance of passwords for keeping details secure, so to delve into this topic further, we’re exploring the importance of using a variety of passwords to optimise your online security.

It’s easy to fall into the trap of being more mindful about physical security than of online security. Leaving you house or car unlocked, or choosing not to set a code to enter your office building seem like poor security choices to make and we would never decide to take these actions. However, you must bear in mind that many of your most important details are accessible online – people might even be able to get into your bank account.

The safest way to operate online is to have a different password for every site that you use. If you begin to duplicate passwords and somebody is able to find yours out via a low-security site, then they’ll also be able to gain access to the higher security ones. Ensure that you generate strong passwords for each online account that you have, and be wary of allowing you browser to remember them. It’s easy to reveal stored passwords by going into the settings, so no matter how many different passwords you have, it’s easy for anybody who uses your computer to find all of them out through the click of a button.

Posted in Online Security

Fraudulent Documentation – the Latest Internet Banking Scam

Posted on December 21, 2015 at 3:14 pm

In the age of the internet, it is incredibly easy for fraudsters to commit crimes related to internet banking and con people out of a great deal of money. Whilst phishing emails have always been something to be cautious of, methods of committing internet banking fraud are becoming ever more sophisticated, and you can never be too careful with your bank transactions.

An increasingly popular method of committing fraud is the production of fake documentation. Fraudsters send letters notifying companies of changes to banking details, and they’re able to make the letters look incredibly convincing. Company logos, personnel names, signatures and many more features can all be replicated to make a document look legitimate. These fake letters will usually be sent to companies notifying them of changes to bank details, tricking them into paying money into the criminal’s account instead.

To avoid this kind of fraudulent activity affecting you, never trust any documentation which informs you of changes to bank details without conducting further investigation. Contact the company who have supposedly sent the letter, but always use the contact details which you have on file for them. Criminals attempting to commit fraud will anticipate you checking and may well have set up fake email accounts, so it’s important not to use any of the information contained within the letter. If you begin dealing with any new companies, remember to take down their contact details and store them somewhere safe so that you can get in touch with the right people should you have any security concerns in future.

Posted in IT Security, Online Security

Important Online Banking Terms And Conditions

Posted on September 25, 2015 at 10:31 pm

Online banking has seen many changes over the past several years. Improved functionality and usage reflect the impact of the changes that have occurred. Along with these changes, many important terms and conditions have also been added and updated.

To start off. When reading the terms and conditions of online banking, the words ‘you’, ‘your’ and ‘yours’ generally mean the person requesting online banking. This is important as it implies that anyone who has the ability to use your online banking account is doing so under the terms and conditions of that bank. Regardless if it is actually their account or not.

It is also important to note that ‘we’, ‘us’ and ‘our’ generally mean the bank and any agents appointed by the bank that carry out services associated with online banking. This means that 3rd party organisations are also under the terms and conditions of that banks online banking system.

Posted in Online Security

IT Security Measures For Casual Users

Posted on June 30, 2015 at 8:57 pm

It is common knowledge how to use a computer or internet device. The fact you are reading this on some kind of internet compatible system means you understand the technology pretty well. But do you understand the fundamentals of IT security. It may be more important than you realise.

Basic IT security is straight forward. It’s in its straightforwardness that people often times forget to do it. Keeping up to date on your current procedure is a great way to refresh your ideas on IT security. Which leads us to the first question. What is your current IT security procedure?

It is not as intimidating as it sounds. Simply put, do you have a password on your computer, phone or tablet? Do you think you should have a password on your computer, phone or tablet? The answer to these questions will go along way in identifying your current IT security set up.

Posted in IT Security, Online Security

Free Computer Security Software, Or Subscription Based?

Posted on March 11, 2015 at 3:53 pm

When it comes to online computer security there are hosts of different options. A big deciding factor when choosing protection is whether you should pay for it or not.

The security itself comes in the form of a program you install onto your computer. This program runs in the background at all times. If you happen upon any viruses, malware or spyware, when online the program will ‘quarantine’ and delete theses immediately.

Free versions of virus security are available online. Some of the programs like AVG are very good and provide just as much protection as paid versions. There are some that are not as reputable. Its important to research well to make up for the lack of money you are putting into the program.

A subscription based program can be great as there are usually regular updates from the developers. Obviously there is a price for it, but the quality of the program is usually better because of it.

Posted in Online Security

SQL Injections

Posted on February 23, 2015 at 11:46 am

SQL injections are one of the biggest issues in online security, because it doesn’t matter if you’re being careful with your passwords online or anything like that, as to do this form of online hacking you don’t need to have password information.

So what is SQL injection? SQL injection is a technique where you enter code into a data field, this then causes the website to execute the code, which is typically account details of members of the website. These account details can then be used to defraud the owner of the account, either by taking the password they used for the account and then checking other services to see if the account holder has used the same password for those services, or by taking the credit card/payment details from the account and then buying a load of products with it before they’re discovered.

 

Posted in Online Security

Computer Security

Posted on May 21, 2014 at 3:47 pm

The computer security services industry consists of a wide range of different services, all trying to accomplish the same, but to differing degrees. The level of service you require should line up with the level of security concerns which your business experiences. Having a firewall, anti-spam, and anti-virus program within your business’s security system is essential for all businesses with a computer reliant business, but this is only the basic level of security offered by the computer security industry. While many of these are things we’re already familiar with, they can be taken to higher levels than what is readily available. Higher grade security programs, and higher grade firewalls will definitely add cost, so you should carefully consider how much value you could potentially derive from choosing such an option, and then construct a forecast to determine whether it is worth it. If it is, then you can do one of two things. You can have them programmed bespoke for your needs, or you can choose an existing but highly complex system.

Posted in Online Security

« Previous Page