Your personal details don’t interest anyone. Or do they?

Do you think it’s not important to protect your personal information online, because nobody is interested in it? Or do you think that no one would bother to steal your details? Surely, digital life would be a lot easier if that was the case. However, none of these assumptions hold true. Find out more on the detailed explanation as to why you should protect your personal information and 7 easy steps to do that.

Criminals can make money with your details
Stolen personal details, like phone numbers, passwords, addresses, birth dates, etc. can be used for crime in many ways. For example, they can be sold to other criminals and be utilized for account takeover and identity theft.

What is spyware?

Spyware is a type of malware that steals data from your device. It can log what you type, take screen-shots, and even use your device camera. Spyware infects your device and spies on what you do. It then passes the information to its masters. While many programs collect information about you, spyware does so without your consent and knowledge. And typically for malicious reasons. F Secure TOTAL sees the danger, even when you don’t and keeps you safe.

Complete the form below to sign up to the Cyber Security Bulletin

Security Bulletin
First
Last

Free Webinar – key cybersecurity tips for POPIA and Cybercrimes bill

This live webinar at 11:00am SAST on 29 June 2021 is a joint presentation by cyber security specialists from F-Secure and legal firm Webber Wentzel on both the Protection of Personal Information Act (POPIA) legislation that will be coming into effect in South Africa on 01 July 2021, and the Cybercrimes Bill that has recently been signed into existence by South Africa’s president.

Webinar Topics:
• Which organisations in South Africa are required to register for POPIA.
• The roles of CEOs, COOs, CTOs, CIOs, IT Managers etc. under POPIA and the Cybercrimes bill.
• POPIA unpacked – a brief summary of POPIA and its comparison to Europe’s very similar GDPR.
• The security aspects of POPIA compliance.
• Could you be doing something illegal under the new legislation without realising it?
• Get answers to your questions by submitting them to the experts during the webinar.

Join us on this page for the webinar

How to know if a website is secure

In the early days of the internet, the common answer to this question was pretty simple: the little lock in the browser bar indicating that the site has a security certificate. Times, however, have changed as this lock is no longer sufficient enough information. In 2018, Google Chrome removed the ‘secure’ indicator on sites that use https. It replaced this with a ‘not secure’ warning for sites that only use HTTP. In one way, this is a sign of good success as internationally as many sites as possible use the HTTPS protocol that encrypts all the information passed on the page. Unfortunately, though, this much-needed step does not eliminate all the security and privacy pitfalls web surfers now confront.

Protecting Salesforce Cloud against malicious content

F-Secure Cloud Protection for Salesforce provides dedicated security components that mitigate the risks posed by files, URLs and emails handled by Salesforce platform users, without hindering the use of Salesforce. The solution also provides rich reporting, advanced security analytics, and full audit trails, ensuring that incident response is fast and efficient.

Tips for secure gaming

Ensuring that one has secure gaming is about protecting your devices and online life against threats and knowing what to do about them.

Gaming has become a huge culture and business of late with games purchases, in-app content, subscription fees, etc. all stacking up to a business with annual worth way over $100 billion globally. Not only that, there are millions and millions of accounts in gaming platforms, forums, and services. These accounts include valuable personal information, such as email addresses, billing information and credit card details.

It’s rather obvious why money attracts criminals who are drawn into the money and data involved with gaming but personal details are also valuable to them. Stolen personal details can then lead to account takeover and identity theft. Gamers outside of their games are just computer users with the same security issues and concerns as everyone else. They can fall victim to any other cyber-attack out there, such as phishing and malware. But gamers nowadays also have to face gaming-specific attacks. In fact, gaming-related cyber-attacks have been increasing during Covid-19. People have had more time to play games during lockdowns and quarantines. The increasing amount of money and personal details are attracting an increasing number of criminals.

Spotted in the Wild

Cyber fraudsters are getting better with time and practice and are able to reproduce astonishingly accurate replicas of legitimate online resources. Of course, not just any online resource is worth their time and effort. The most targeted sites are online login portals like banking sites, MS Office 365, Google (Google Cloud Platform, Google Drive, Google Mail, etc.), Apple Store, and Facebook, to name but a few. Essentially, the greater the user base, the more it will be targeted by cyber criminals.

This bulletin is intended to increase the security awareness in organisations by providing useful information to help enhance security and safety when using computing devices and the Internet.

Be sure to consider some of the cyber threats out there and consider these tips for protecting yourself and your devices. Until our next mailer, you can check out all the great resources we have available on our website.

The Cybervision Team