Blogs

Showing items tagged with "Hacking" - 2 found.

Protect your on-line reputation to avoid an email disaster

Posted Tuesday September 15th, 2015, 9:52 am by

How well do you protect your on-line reputation to avoid an email disaster? The hacking of Ashley Madison website (the dating agency) provided some statutory lessons about how one’s reputation can be destroyed in a nano second. In a nutshell, this well known dating agency’s data was hacked. Details of about 33 million accounts were released including peoples sexual preferences and fantasies linked to their email address. They also cracked passwords and credit card information.

What made people and business’s more twitchy than usual was that names were associated with companies, because many were silly enough to use their business email address. Technology companies listed included Apple, HP, IBM Sony, Snapchat and Vodafone. Many others were Government officials and household business names.

As a result we have seen some people resigning from their jobs and at least one suicide.

This highly visible hack provides several very pertinent lessons both for us as individual users and corporately for the business. None are new. Perhaps the surprising fact is that so many people continued to forget to bolt the door securely on their on-line identity until it is too late.

Lesson 1 – never use your business email address for anything other than business unless it is an emergency. Use a personal email address for all social emails.

Lesson 2 – be very vigilant about what information you post on websites because In reality nothing is private on the internet. Several people paid to have their profile removed but it still turned up.

Lesson 3 – before hitting send and posting information think about the consequences to yourself should someone else find it, for example either through hacking or worse still close friend or partner.

Lesson 4 – set strong passwords. One survey revealed that over 120 people use simple ones like 123456. Click here for more about password management.

Lesson 5 – spend time developing a crisis management plan whether for your business or self in the event of such a disaster.

This won’t be the last high profile hack but hopefully some will take these five lesson seriously and especially use their business email address more cautiously to manage their own and their company image more carefully.

Call Mesmo Consultancy now to discuss how we have helped our clients to improve the management of their on-line reputation to avoid an email disaster like this and the Sony email disaster.

Tags: , , , , , ,

Read this post... | Comment on this post

Email security and internet security – password protection

Posted Friday November 8th, 2013, 5:46 pm by

The recent hacking of the Adobe website is a salient reminder of the need to remain vigilant about protecting ones personal information on-line. One of the most stark factors to emerge was the number of very weak passwords used by people. Email security and internet security depends in part of having strong passwords and being vigilant about what you post on social media sites.  A recent report revealed that the most common passwords were ‘123456’ (190,000+ users) and ‘123456789’ (46,000+ users).

Creating a strong password is really quite easy. Think of a meaningful sentence and then take the first letter of each word and use it to construct a password. Turn a couple of letters into capitals/symbols and add in a couple of numbers and you have a strong password.  For example:

In my youth my favourite singer was Leonard Cohen. A password might be 1mYMf3Wlc!

Email security

Email security

Three other top tips to follow to improve your email security are:

1.  Password protect important attachments.

2.  Do not put confidential information in the body of an email, rather either convey the information verbally or in a password protected attachment. Click here for an example of what can otherwise go wrong.

3.  Remember that despite your best efforts email evidence is very rarely destroyed. Someone somewhere will always have a copy.

For those managing a business (no matter what size) a key part of your email and internet security must be your Acceptable (computer) Usage Policy (AUP).  It must be up-to-date to take account of changing technologies, and you must have evidence that everyone has read and accepted its conditions.

Click here to access our free on-line tool to benchmark just how robust is your current AUP.  Mesmo Consultancy have helped many clients improve their email security and reduce the risk of leaking sensitive and confidential information.  Call us now for a free consultation and review about how vulnerable your business is currently (+44 (0)1202 434340) .

Tags: , , , ,

Read this post... | Comment on this post