Newsletter 28th December 2018 – Cyber Security

Hello ?

Elite Security Systems are not experts on Cyber Security. Having met Richard Lambe from British Standards Institute’s Cyber Division and attended one of his seminars I would like to pass on some of the knowledge he passed on to me. As most things are being connected to the internet, we want you to be aware. You could be compromising your own security.

Cyber security comes in many forms.

Years ago, the weakness in cyber security used to be the software and devices however time has seen updates and patches etc and now the culprits are targeting the users to get the information they require. Data can be anything from name and address to bank details or bank passwords or even employee records, data is a valuable commodity to a perpetrator and can open the door for many types of cybercrimes.


Passwords for the devices that we use whether that be a computer, smart phone or even the websites we log into, it is critical that we use a strong password and even two factor authentications is more secure.

Are we being safe online?

The majority are but have we dotted all the I’s and crossed the t’s?

The router

Have you changed the default passwords that the router comes with?

It’s said that a lot of routers are left using the default passwords.

Phishing what is it and how does it affect us?

Human factor is the largest risk of cyber attack through phishing. Richards mantra is “In a company employee are the strongest asset but the weakest link”. The same at home.

Email fraud, you receive an email from your bank, but is it really from your bank, always check the email address. It could be similar but not exact which is how they trick you. They ask you or say that something is wrong with your account, maybe you are overdrawn, they ask you to click the link to ascertain what is wrong with your account. But really you are directed to a similar website to Login to. Now when you’ve logged in to this website it does nothing. But it has, it has received your password and login details which a perpetrator can now use to login into your real account. And so, remove money or buy goods without your consent. A good routine to have is not to click links and enter the URL for the website yourself in a browser, that way you know you are logging in to the desired website.

Again, going back to data, if they have gained access to employee details, they could sanction the action of paying a supplier (the culprit). For instance they know a director is on holiday cause he has  posted it on social media and they know the email address of a person in accounting. They fake an email to look like it has come from the director and say, “Hi enjoying my holiday in Switzerland knocking back the snaps and eating far too much fondue, however I forgot to pay a supplier or sanction it could you pay them, here is there account detail”. Job done if they pay it. This is where two factor authentications can be very handy. A quick phone call to the director would confirm or not the email. Also, this could happen in your personal life, email from a brother, husband or son etc not forgetting you ladies but us men aren’t as proficient as you ladies at getting things done ?.

Social Networks Engineering

Safe websites which are malware checked, like Elite Security Systems website.

Malware can be added to a site that ask for details, redirection of data from that site to a culprit enabling them to get data from you.

Angling phishing attacks, again they direct you to a malicious website during a conversation about being annoyed about a company that has been posted on Facebook or some other social website and steal you credentials or download some malware or ransomware using the link THEY provided.

  • 93% of breaches are attacks targeting people.
  • 96% via Email.

Stay safe people it only has to happen once to compromise your security, and in the case of companies their reputation.

Wishing you a Happy and Prosperous New year, thanks for reading

Kind regards

Marketing Department

Signup to our Newsletter and get it in your email inbox:

Or check our Security Newsblog, add comments ask questions