News

16th May 2017
Is Facebook leaving your business open to cyber security threats?

Is Facebook fun risking your business?

Who have you seen live in concert? What is your pornstar name? Where were you born? These may all seem like innocuous enough questions – something to pass the time, get to know your Facebook friends better or a bit of a laugh – but have you considered the type of information you are sharing with the world when you participate in these games on social media? The BBC has reported warnings that the recent Facebook craze of comparing lists of the top 10 concerts you have attended could actually be putting your data privacy and cyber security at risk.

Think about it, some organisations ask about the first gig you attended when you set up online banking and similar private accounts. Similarly, your mother’s maiden name and the name of your first pet (used to create your “pornstar” name) are also common identity authentication questions. Sharing this information online with a group of people (many of whom you barely know) is not bright and it could be making your personal finances and the future of your business vulnerable to hackers.

University of Surrey’s Prof Alan Woodward agrees that people should be cautious with the information they are putting out there, a standpoint the Switch2IT team continues to champion in the name of IT security. He believes that cyber criminals were not the brains behind the recent concert question phenomenon although warns that they are opportunists and games such as this, which reveal private information about their contestants and become so popular among the masses, are likely to be advantageous to them. 

By contrast, Prof Angela Sasse, director of the UK Research Institute in Science of Cyber-security, makes a good point that the companies using such questions as security credentials are the ones in the wrong rather than those taking part:

"Companies are violating the security principle that the way of authenticating people should be private – such as a password or pin number – rather than something that is publicly available."

What baffles us is that the human race has reached enough technological advancement to launch a rocket that lands on a drone ship but we still rely on question based authentication, which causes so many cyber security issues. At the very least, two-factor authentication is the way forward, as we have said before.

How to improve cyber security

Ramping up your Facebook privacy settings (which are confusing and as changeable as the British weather) and being selective about who you accept friend requests from is not the answer to protecting your data fully, although both are advisable. Those with 1000 Facebook friends increase the odds of an IT security breach – it only takes the account of one “friend” to get compromised and then everyone connected is in trouble!

Cyber criminals are clever and you can never be certain that you are talking to Cousin Bob or your next door neighbour. Your account could be hacked, the account of a friend could be cloned and you may even, unwittingly, allow third parties such as apps access to your information. However, Facebook offers some sound advice for self-preservation:

  • Protect your password
  • Use Facebook's security features
  • Make sure your email account(s) are secure
  • Log out of Facebook when using a shared computer
  • Run anti-virus software on your computer
  • Think before you click or download anything

Prof Woodward also offers good advice on how to improve IT security for you and your business:

"People should also use a password manager that will generate proper strong passwords which will also mean they are not using the same password for their accounts.

"The best password is one you can't remember."

Switch2IT’s technical support experts can offer plenty more advice on how your business can keep cyber security threats at bay. For those businesses in need of a cyber security audit, we offer IT project management and IT consultancy services that will help to identify potential issues and put your business back on the right track.

To stay on the right track and maximise the productivity of your business without any cyber security set-backs, our managed service IT support contract, with the benefit of a dedicated technical engineer and excellent telephone and email support, is the ideal solution. Contact us today for more information about our services or to request a quote

Latest News

26th June 2017
Top tips for acing IoT cyber security

How to maximise Internet of Things cyber security for your business As the BBC's Jane Wakefield explains, “The Internet of Things is about connecting previously dumb objects, such as light bulbs and cameras, to the network”. While it is useful to have everyday objects implanted with software and sensors that make them “smart...

Read More >
16th May 2017
Is Facebook leaving your business open to cyber security threats?

Is Facebook fun risking your business? Who have you seen live in concert? What is your pornstar name? Where were you born? These may all seem like innocuous enough questions – something to pass the time, get to know your Facebook friends better or a bit of a laugh – but have you considered the type of information you are sharing with t...

Read More >
24th April 2017
Looking towards a hi-tech future for your business

Here’s to technological advancements with Switch2IT With the South Downs looking luscious once again and the surrounds of Sussex, Hampshire and Surrey displaying more magnificence with its bluebells per woodland than that high DPI monitor you are lusting after, it makes us realise the technological world is always burgeoning . With this in ...

Read More >
30th March 2017
IT solutions: It's a game of two halves

Own goal for cloud computing Recent reports reveal that cloud computing is not the omnipotent IT solution that some industry pundits believed it would be. That is, cloud outages are beginning to show the cracks in all the marketing hype! We read in ComputerWeekly.com how the Amazon cloud storage outage is a stark reminder of the role humans still...

Read More >