Blog

Showing items tagged with "email cyber crime" - 5 found.

Creating Strong Passwords

Posted Thursday January 12th, 2017, 11:48 am by

Over the past few days many people have seen their Facebook page hacked.  It is essential that you change your password. Here are three top tips to creating strong passwords.access-data-694539_640

1.  Second, use strong passwords which are really very easy to construct and remember. Take a phrase and then build a password from the first letter of each word and turn some into capitals and numerics, for example make your ‘i’ and ‘1’ and add a couple of symbols.  For example ‘I love playing golf in the summer at Parkstone Golf Club’ can become 1Lp9itS@Pgc.

2.  For those with multiple accounts consider using some form of password management software such as LastPass or Keepass.

3.  Where you have a choice adopt devices which have more than just password protection for example finger and retina recognition.

Don’t forget too to be extra vigilant with your email account because email is often the open backdoor for a cyber attack.

For more about how Mesmo Consultancy is helping our clients to reduce the risk of email cyber crime through email best practice contact us now.

Tags: , , , ,

Read this post... | Comment on this post

Articles of note – August 2015

Posted Monday August 3rd, 2015, 4:28 pm by

Not surprisingly most articles which have caught our attention relate to the challenge of whether or not to disconnect whilst on holiday.  Here are a few which should give you food for thought about why and how to go for an email detox and disconnect.

And  just in case you are careless with your Out of Office message.

  • Cyber insecurity: when 95% isn’t good enough.  This reinforces the fact that the weakest link in the battle against cyber crime is us the human being.  More often than not a breach of security begins with an email and our careless email behavior.

So before you take your vacation, be sure to set a safe and simple Out of Office message which discloses as little information as possible.  Then switch off and have a proper break to re-charge the batteries.

Tags: , , , ,

Read this post... | Comment on this post

Close the email backdoor to cyber crime

Posted Tuesday November 4th, 2014, 9:59 pm by

Who is the weakest link in the fight against cyber crime? It is us the user. Click here to listen to how we leak data ever day through careless use of email. Without thinking we have either opened or sent an email which opens the door to cyber crime be it hacking, stealing our identity (phishing) and giving away confidential data.

There are many ways we can manage our email behaviour to reduce the risk to ourselves and our organisation of a breach of confidentiality and improve email related security. Here are our top five tips.

Email cyber crime

Email cyber crime

  1. Be alert to unusual emails even from well know colleagues, eg – updates, especially for you, my CV, money for XYZ crisis. Sadly, emails scams often pick up on recent natural disasters such as the Ebola crisis.
  2. Make sure when you go to a website that it really is genuine, ie BBC.co.uk really is BBC.co.uk. Before clicking on the link, hover over it and check what the url is showing in the bottom left-hand corner of your browser. If it looks suspicious stop and access the website directly from the browser address bar.
  3. Use Bcc when sending an email to many people – it limits the risk of spammers getting a list of email addresses.
  4. Set strong passwords for your email and other accounts. Click here for tips.
  5. When setting up a new social media account, selectively add only those contacts that you really need. Don’t use the default option of uploading you entire address book.

Education is the key to reducing the risk of an email predicated cyber attack. For a free five minute review of your email security behaviour and how you can improve it either call Mesmo Consultancy on 01202 434340 or email us now to book an appointment.

Tags: , , , ,

Read this post... | Comment on this post

Which is more annoying spam or forgetting your password?

Posted Wednesday October 15th, 2014, 9:17 pm by

According to recent research from Centrify (providers of identity management services) forgetting your password is more annoying than spam email.

The cost of cyber crime has doubled in the past four years according to recent research from Ponemon.  Strong passwords is one way to prevent prying eyes but Cyber crimejust how easy is it to construct one?  Also is it good to keep changing your password?

Back in 2010 Microsoft found that changing security words often cost billions of pounds as people wasted time constructing and memorising them and then forgetting them and worse leaving them unsecured.

Centrify now estimate that poor password management costs around £130,500 per year for a business of about 500 users.  How they arrive at that figure is not clear.  What is clear is that we really are not good at the basics of identity management.  The top five mistakes being:

1. Always use the same password whenever possible.
2. Rotate through a variety of similar passwords.
3. Keep a written password in a master book of passwords.
4. Use personal information in a password.
5. Avoid using complicated symbols or combining upper and lower case.

Security management behaviour can easily be improved although it often takes a cyber attack (personal or corporate) as a wake up call.  User education is key to reducing cyber crime.  Here are our five top tips.

1.  Avoid the traps identified above.

2.  Second, use strong passwords which are really very easy to construct and remember. Take a phrase and then build a password from the first letter of each word and turn some into capitals and numerics, for example make your ‘i’ and ‘1’ and add a couple of symbols.

3.  For those with multiple accounts consider using some form of password management software such as LastPass or Keepass.

4.  Where you have a choice adopt devices which have more than just password protection for example finger and retina recognition.

5.  Be vigilant about those emails which grab your attention telling you your accounts has been hacked.  Delete them without even opening them as they are almost certainly from spammers attempting some form of identity theft.

Email is often the open backdoor for a cyber attack. For more about how we help our clients to reduce the risk of email cyber crime through email best practice contact us now.

Tags: , , , , , , , , ,

Read this post... | Comment on this post

Email security over the vacation period

Posted Monday July 29th, 2013, 8:41 pm by

Email cyber crime attacks effect one in two UK citizens and on average £247 is stolen from bank accounts per successful attack.  Moreover, the Government’s Intelligence Services estimate that UK businesses are subjected to roughly 1,000 cyber attacks every hour.  Email is often the low hanging fruit for the cyber criminal, rather like leaving the car keys near the front door so that the criminal can fish them out.  How well do you and your business manage email security?  When was the last time you updated your email best practice policy and provided any email management training?

There are two types of email security breaches, those we cause by carelessly leaking confidential information and those where others attack us.  This blog deals with the former.  Common cause of leaking confidential information by email (and not just during vacation time) are through:

  • forwarding information to others who should not see it;

    Cyber crime

    Email security

  • sloppy Out of Office messages;
  • sending the email to the wrong recipient;
  • delegating access to another person but not properly briefing them on how to handle our inbox.

Here are five top tips to help you manage the risk of a breach of email security and hence open the back door to a cyber crime attack especially during the vacation period.

  1. Set a simple and safe Out of Office message – click here for for more help.
  2. When giving access to someone else leave adequate time to brief them on what to expect that needs handling and how to manage the rest.
  3. If you are expecting confidential information aks the sender to put ‘confidential’ in the subject and set up a rule to send it to a separate folder.
  4. Avoid sending work emails to a social/home email account.
  5. Always re-read emails you are forwarding on to check the whole chain for any information which the new recipient should not see.

If possible try to take an email free vacation.  We all need down time.  Dealing with sensitive emails over the holiday in a relaxed state of mind is often when breaches of security happen as we are at our most vulnerable.  If you feel you cannot swich off it might be because you are suffering from email addiction.  Click here to check if you are suffering email addiction.

Tags: , , , , , ,

Read this post... | Comment on this post