But more importantly, their employees are sufficiently trained in spotting fake emails and aware of not giving out company Wi-Fi passwords to avoid unauthorised use (unless the password is for the 'guest' network of course).
So, this week I was horrified to read an industry report on the use of a new tactic, involving 'X-rated' material, being sent out in phishing emails (known as 'dynamite' phishing)!
According to the report by GreatHorn, it's not only simply libido driving users to 'click' through, but more intended to 'shock' the user into a reckless decision to 'open the door' to hackers. The spike in these socially engineered 'Business Email Compromise' (BEC) attacks have spiked by a whopping 974%.
Passwords are another vulnerability and can lead to both personal and company data being hacked, breached and leaked onto the internet. The headline, in this case, courtesy of Techradar is, "Largest collection of passwords ever has been leaked online".
8.4 billion passwords to be precise, so now is the time to check every subscription service, online shopping accounts, social media accounts and change those all-important passwords.
"Use a random password generator and a secure password manager service!"
Meanwhile, in the USA, Amazon is now modifying their Smart Home devices (Alexa, Echo and ring Doorbell systems) to 'join' up from house to house, creating a street, suburb and county-wide network to allow even more Internet of Things (IoT) devices to connect by effectively using every single broadband connection, 'bridged' together using Amazon hardware.
Personally, while our desire for having smarter, more connected homes is a very convenient use of technology, I for one won't be allowing any devices from neighbours to share my personal internet connection! Nor will I have bridging firmware built-in anywhere near my home.
It's a fine balance of technology and the constant threat of hackers and scammer forever wanting to commit fraud, using identity theft, trying to get at your hard-earned cash. Businesses can lose millions in both money and reputation when customer data is leaked and that in turn could lead to hundreds, if not thousands of job losses.
Criminals say that they are just trying to survive like anyone else, but there are ways and means of earning a living legitimately and without ruining people's livelihood. We live in a world where our lives can be manipulated in the virtual world, which in turn leads to real-world problems such as adverse credit ratings, loss of £m's in credit card fraud and businesses being held to ransom by data hackers.
"We cannot afford to have the usual 'it won't happen to me' attitude any longer!"
Every single individual and business must conduct regular network vulnerability checks on their systems, review password policies, encrypt customer data in the first instance and do as much as possible to implement Email Security systems to reduce phishing attacks.
In the meantime, keep your online data safe and keep your customer data safer.
Until next time ...
Would you like to know more?
If anything I've written in this blog post resonates with you and you'd like to discover more, it may be a great idea to give me a call on 01604 926100 or take a look at my website which you can find by clicking here.
The word 'Technology' has too many connotations in today's world!
Where do we start? Simple terms like 'IT' and 'Telecoms'? or terms that appear NOT to have an actual meaning at all!, e.g. 'Internet of Things (IoT).
Technology also encompasses specialist products and services like 'Rugged' and 'Tough' android devices, Lone Worker Software, panic alarm devices, smart energy devices, low energy lighting, credit card terminal (PCI DSS) security, indoor/ outdoor Wi-Fi systems, Ultrafast Gigabit internet connectivity, access control systems, industrial IoT circuit controllers.
BTS UK can consult from simple solutions to the most complex, provide some of the products through a wholesale channel, bring together a multi-disciplined 'Task Force' to deliver and implement complete Technology 'projects'.
I am your technology problem solver and I look forward to helping you.
No unauthorised use, duplication, distribution or modification to any original content contained within this blog is permitted without prior written permission of the author. All other trademarks and registered names are acknowledged.