They know who you are….

fisicx

Moderator
Sep 12, 2006
46,647
8
15,354
Aldershot
www.aerin.co.uk
You can have a super secure network and encrypted everything but it’s no good if you leave the door open:


Even better if your password is swordfish.
 

Ozzy

Founder of UKBF
UKBF Staff
  • Feb 9, 2003
    8,314
    11
    3,434
    Northampton, UK
    bdgroup.co.uk
    My finance dept constantly get emails from me, from my wife, from our non-execs, all the time requesting payments and purchases.

    It makes me smile because we have a procedure for payment processing which involves my physical presence accounts office if it is a request from me, so until they can print clones of people....
    I'll never request a payment by email or phone call, nothing will ever be so urgent it cannot wait until we meet in the office to discuss it and I 'wet ink' sign the order.
     
    • Like
    Reactions: Deaytch and ctrlbrk
    Upvote 0

    DontAsk

    Free Member
    Jan 7, 2015
    5,446
    3
    1,392
    I keep getting e-mails asking for "the cleared balance" to my business e-mail. Most stuff is trapped by my host which seems to have very good spam filtering. I get a few false positives and fewer false negatives (the example being one of them). Most of the false negatives are then trapped by my e-mail client
     
    Upvote 0
    My finance dept constantly get emails from me, from my wife, from our non-execs, all the time requesting payments and purchases.
    And now they will start getting video calls/messages created by AI!
     
    Upvote 0

    japancool

    Free Member
  • Jul 11, 2013
    9,741
    1
    3,445
    Leeds
    japan-cool.uk
    @Ozzy walks into accounts office.
    Ozzy: "I understand that suppliers are asking for payment. It is important for businesses to make payments promptly. Prompt payments can also help businesses establish trust and credibility within their industry. Additionally, failing to pay on time can lead to late fees, damage to credit ratings, and strained relationships with partners. Therefore, prioritizing timely payments is essential for the smooth operation and reputation of a business. It is important to understand that you verify payments through my physical presence."
     
    Upvote 0

    fisicx

    Moderator
    Sep 12, 2006
    46,647
    8
    15,354
    Aldershot
    www.aerin.co.uk
    It’s not just about financial shenanigans. It’s about sneaky access to your network. Once they get access they do all sorts of nasty things. Like monitor all your emails. Get your passwords and credit card details. Next thing you know you are the owner of a new car in Russia.

    No need for ransomware any more.
     
    Upvote 0

    Kerwin

    Free Member
    Dec 1, 2018
    892
    192
    It’s not just about financial shenanigans. It’s about sneaky access to your network. Once they get access they do all sorts of nasty things. Like monitor all your emails. Get your passwords and credit card details. Next thing you know you are the owner of a new car in Russia.

    No need for ransomware any more.
    Most of that is pretty easily mitigated by using encryption.

    Use end to end encryption on emails and they can't access them. Passwords and credit card details should be stored in an encrypted vault. Pretty much every website uses HTTPS by default as well which also helps. You can also use things like linux namespaces for even more protection (I don't know what the Microsoft version is called). Oh and don't forget a decent firewall.
     
    Upvote 0

    fisicx

    Moderator
    Sep 12, 2006
    46,647
    8
    15,354
    Aldershot
    www.aerin.co.uk
    Agree. But the article was about hackers and others gaining access to your networks legitimately. All they need is a username and password. Once in they can extract all sorts of information and you will never know.
     
    Upvote 0

    Nico Albrecht

    Free Member
    Business Listing
    May 2, 2017
    1,619
    471
    Belfast
    data-forensics.co.uk
    You can have a super secure network and encrypted everything but it’s no good if you leave the door open:
    Here's the issue: maintaining a secure network requires both financial investment and ongoing upkeep, which many consumers and small businesses are unwilling to pay & prioritize. From what I've observed, there's often a lack of proactive learning from past incidents or a reluctance to embrace change altogether.

    For instance, why shell out a min £150 or more for a router with robust firewall capabilities and comparable Wi-Fi access points when your ISP provides one for free? These ISP-supplied routers often lag behind in security updates, sometimes receiving them annually or even less frequently, leaving vulnerabilities exposed to potential threats that require more frequent patching.

    Then there's the blind trust in brand names. Take Apple, for example. Despite a history of security issues, they've managed to mitigate concerns through aggressive marketing, fostering a perception of safety that may not always align with reality. It got a bit better since they run the iclound on google cloud servers now but still.

    The rise of NAS devices is another case in point. While they're increasingly popular, many owners lack the necessary expertise, leading to risky practices like improperly configuring port forwarding for remote access. This creates ripe opportunities for hackers, especially with the proliferation of "home cloud" solutions offered by these devices, which can pose a single point of failure if security measures falter.

    We've also seen incidents with products like Qnap NAS, which suffered multiple hacks through their update mechanisms, leaving countless devices vulnerable to encryption by malicious actors.

    Even seemingly convenient solutions like Ubiquity cloud keys can backfire due to lax security practices on the manufacturer's end, resulting in millions of users' API and secret keys being exposed. While these technologies offer convenience, they also present concentrated targets for hackers to exploit, such as gaining remote access to routers and creating unauthorized VPN users.

    Despite the availability of two-factor authentication (2FA), many consumers and businesses still overlook its importance, citing complexity as a barrier. This leaves gaping holes in security defenses, ripe for exploitation by attackers.

    Overall, the trend toward user-friendly interfaces and seamless integration has inadvertently lowered the barriers to exploitation. Cloud-based solutions, while convenient, introduce single points of failure that can lead to catastrophic breaches. In essence, the pursuit of user-friendliness has come at the cost of robust safety and security measures, potentially leaving us more vulnerable than we were 15 years ago.
     
    Upvote 0

    gpietersz

    Free Member
  • Business Listing
    Sep 10, 2019
    2,712
    2
    705
    Northwhich, Cheshire
    pietersz.net
    Most of that is pretty easily mitigated by using encryption.

    Use end to end encryption on emails and they can't access them. Passwords and credit card details should be stored in an encrypted vault. Pretty much every website uses HTTPS by default as well which also helps. You can also use things like linux namespaces for even more protection (I don't know what the Microsoft version is called). Oh and don't forget a decent firewall.

    End to end encryption in emails is a great idea, but very few people bother taking the minute or two to set it up (I suspect most do not know it exists). A lot of businesses will not want it because they want to see email going through their systems, small businesses and individuals mostly use webmail which AFAIK does not even support it.
     
    Upvote 0

    fisicx

    Moderator
    Sep 12, 2006
    46,647
    8
    15,354
    Aldershot
    www.aerin.co.uk
    And why should it scare anyone? Personally, I have nothing to hide.
    Maybe not. But they are tracking everything you do. They know where you are, what you eat, your private habits. They know about your family in far more detail than you would like. All your medical data is for sale as are your passwords, banking details and other private details.
     
    • Like
    Reactions: gpietersz
    Upvote 0

    gpietersz

    Free Member
  • Business Listing
    Sep 10, 2019
    2,712
    2
    705
    Northwhich, Cheshire
    pietersz.net
    Use end to end encryption on emails and they can't access them.
    People just do not use E2E encryption for emails. Most people use web clients that do not provide it (I think Proton does, but none of the big ones do) and the rest cannot be bothered spending two minutes (it literally took me about four clicks) setting it up.

    I have tried just signing emails to prevent spoofing and I have had no indication that anyone else has systems set up to read the signatures so the verification is probably useless, and several people have said they cannot "open the attachment".
     
    Upvote 0

    campbeji

    Free Member
    Mar 31, 2008
    174
    39
    the excuse will be, there's no objection if you have nothing to hide

    it surprised me to discover that the government monitors my eBay sales

    there were suggested entries, when I filled in an online Customs form

    the intention was I suppose to be helpful, but it felt intrusive
    I don't think the Government was suggesting the entries in the customs forms, probably a simple software script that helped you to fill in the customs form. As far as I understand it the Government is only going to get the details of people who sell a certain amount and then contact them to make sure they are paying their taxes.

    Good Luck
    Jim
     
    Upvote 0

    fisicx

    Moderator
    Sep 12, 2006
    46,647
    8
    15,354
    Aldershot
    www.aerin.co.uk
    There have been a number of articles on how crims and state-actors are increasing their use of AI in social-engineering attacks. Instead of spending time and effort hacking into your network they get you to hand over your credentials.

    In some cases they can spend years inside your network and you would never know. But all your secrets are now in the hands of someone else.

    Some of the phishing emails are now so good they are fooling infosec experts.
     
    Upvote 0

    Latest Articles

    Join UK Business Forums for free business advice