Your Business Best Practise For Data Security

Meeting room and table with chairs facing a large television and webcamBusiness security is so much more than just fitting security shutters to the windows and a sturdy lock on the door. Of course keeping unwanted visitors out, protecting premises against vandalism and graffiti are all important considerations, however, there’s much more to consider than a comprehensive CCTV system and functioning burglar alarm. We’re talking data security.

The risks business face are so much more than simply premises and inventory. Everyone who comes through the doors, staff, customers, and visitors have to be protected as does all the company’s sensitive data. Security screens and alarms keep burglars out, staff and security keep visitors safe from harm and also protect property, but what about data? Read more

How Can Anti Virus Software Protect Your Whole Home, Contents Included?

WiFi enabled tablet in persons handsIf you’re a PC user you’d never think of going onto the internet without first installing an antivirus software package. If you’re a Mac user you’ve been spared this hassle, although some pundits suggest that Macs need protection too, it’s never been an issue that has been taken too seriously.

But it’s becoming increasingly important, as people use their broadband for services other than surfing the internet that you get not only your computer, but your whole home wifi network protected, indeed, even when you’re using a Mac.

Because there are so many devices, including lightbulbs, CCTV, ovens and fridges which use a wifi connection to communicate with one another a comprehensive solution is required. It’s simply not possible to install a suite of malware, Trojan and virus protection on the chip that turns your lightbulb on and off so it’s vital that you protect your network at source, by installing antivirus on your PC and router. Installing antivirus on your router is almost as easy as it is on your computer, it simply needs following a few additional steps. Depending on the device you use it’s most likely to mean plugging the computer into the router via an Ethernet cable (which would have come in the router’s packaging when it was bought), downloading the software from a reliable source, and saving it in the place directed by the setup wizard. Read more

Is Your Smart Home Vulnerable To Silent Security Breaches?

smart speaker vulnerability silent security attackYou’ve probably heard about the ‘friends’ who, late at night yell “Alexa, play Slayer at full volume!” through a neighbour’s letterbox. It’s an amusing story, it’s got the ring of authenticity because as a security breach, it’s not only plausible, it’s entirely possible. As a prank it’s annoying, but harmless But what it does highlight is one of voice control’s most obvious and easily exploited vulnerabilities: if you don’t train Alexa or Google Assistant to respond to your voice alone, anybody within earshot can make them do things.

For more than two years Google and Amazon have also been aware of another possible chink in the armour that surrounds voice responsive technology, that it’s so sensitive and works on frequencies beyond human hearing, meaning that commands loud and clear enough to get Smart Speakers and Home Hubs to do anything can be broadcast without the owner ever being aware. Read more

After Recent Home Network Security Breaches, What Are The Top Tips To Secure Your IoT?

Modern angular lounge in earthy neutral colours. The room is filled with modern technology.Over recent weeks we’ve heard about staff at the head office of a major smart home security and environmental control manufacture sharing video that the home security cameras with colleagues. It’s hard to define this abuse of trust a breach as such, but it does highlight the responsibilities service providers have to look after their clients’ interests when they put themselves in a position of trust.

Concurrently a homeowner in California had her home system hacked. She was told that North Korea had launched a retaliatory missile attack, followed by sounding alarms. Then there was a family in Illinois who had someone talk to their baby, swear at them, and turn the heat up to above 30 degrees. Other households have had people watching them and speaking to them via their security cameras, threats made against their children and loud music played over baby monitors. While being frightening, so far there have been no reported incidents of people taking over a home network and using it to facilitate a crime but it’s a distinct possibility that it could happen if people don’t tighten up the way they secure Smart Home Devices when connecting them to the network. Read more

Cyber Security For Toys Isn’t Something To Play Around With

R2D2 Smart Enabled WiFi RobotElectronic devices are no new thing. And receiving the latest gadgets for Christmas is a joy since it’s always fun to see what new things they can do to improve your life. However, today there’s a snag. Many connected devices are ‘always on’ and listening for the wake word which lets them know you want them to do something. While what they detect while they await instructions is deleted every few seconds, there is always a chance that your smart devices are vulnerable if you leave the settings as you found them out of the box.

The new electronics you received will likely have cameras as well as mics, and you’ll likely be putting them in every room in the house. Meaning that both your security and privacy can be compromised. While you’re not doing anything wrong in your own home when you think nobody is watching, there’s no reason why you would want any of that data falling into the wrong hands. Read more

Home Security In The Digital Age

Google and Amazon have been pushing us to buy smart connected devices for the past year or so, and as their offering of controllable devices, apps, media subscription services increases, the viability and usefulness also increases. And, just as Moore’s Law predicts, as the processing power increases exponentially, the price of entry decreases. Indeed, in order to secure their device’s place in your home, you can find offers on Minis, Dots, hubs bundled with lights etc. for at least half of the usual retail price. Their theory is, once you adopt one device or another you’ll have no need to buy the other since they effectively do the same job. Once you’re tied in they’ve got you for life. As we see every day in tech purchasing, brand loyalty can become deeply entrenched.

Smart Home Devices are being pushed by the major high street retailers. Home entertainment, TV subscriptions, lights, sound systems are all on high rotation during the ads, online marketing is placing the ads in front of us when we’re scrolling on Facebook, Twitter and Instagram, making the Smart Home Option almost inevitable. We see the advertised advantages, but what are the down sides? Read more

Safe, Simple Wireless Technology Security, A ‘How To’ Guide

We’re not suggesting that the typical burglar has added a laptop to his traditional striped top, mask and duffle bag with ‘Swag’  printed on it, but as crime rates climb, it increases in the cyber realm as much as it does on the streets. Criminals aren’t the kind of people to let opportunities slip past them, and once the thief or burglar catches on to the fact that they can use wireless technology to make their lives of crime easier, they certainly will.

The ways that criminals can take advantage of your incorrectly secured wireless home network can manifest themselves in several ways, many of which we’ve probably never thought of yet, but they currently include identity theft, credit and debit card data scraping and cloning, disabling security cameras and controlling webcams. It’s a truism to say that you wouldn’t go out and leave the house unlocked, but if you don’t lock down your home wifi network, that’s exactly what you’re doing with your data, and, as Wi-Fi enabled access control becomes more prevalent, your front door too. Read more