This week we take a look at why automatic log ins could leave you open to hacks, why business are ignoring IT security, and Kaspersky’s top tips to avoid fraudsters on social media.
Intercede’s latest research finds that consumers are leaving back doors open to hackers as they automatically log on to mobile apps.
Richard Parris, CEO of Intercede explained: “Keeping your Facebook, Gmail, shopping and financial accounts automatically logged in might be convenient for consumers, but it’s leaving the back door wide open to hackers. Consumers are more wary about clicking ‘Remember me’ when it comes to online banking and financial apps, but cyber criminals don’t necessarily need access to your bank account or credit card details to commit identity theft.
“There are plenty of rich pickings available in email and social media accounts too. Leaving yourself automatically logged in is like leaving the windows of your house wide open while you’re out – it’s time for a new generation of secure identity authentication.”
Despite this news, Kaspersky has found in its own survey that 78 per cent of those polled do not believe they are of interest to hackers.
“Attackers often look through social networks searching for information inadvertently left by the user. This information may help them in committing a crime: email addresses can be used for fraudulent schemes; some information may help them break a password or identify a user location and much more,” said the firm.
Kaspersky has also offered up its top tips for avoiding falling victim to fraudsters on social networks:
– Use strong passwords for your accounts and disable the auto-complete function, especially if you log in from your smartphone or tablet
– Restrict the amount of information you share on the network; divide your "friends" into groups so that you can share something very personal only with those you really trust
– Do not download files, or follow links if you are not sure who has sent them
– Before you enter your credentials, make sure it is not a fake page created in order to get your username and password
– Try to use a secure connection if possible, do not enter your login and password when connecting to the first hotspot you come across
– Most importantly, make sure the device you use to enter a social network is well protected: use a password to access the device and a reliable security solution
In other news, Globalscape’s James Bindseil has highlighted the importance of safe file sharing amongst businesses.
“The IT security industry has seen dramatic growth in recent years. As businesses move technologies into the cloud and adapt to an increasingly mobile workforce, IT threats have naturally grown. For enterprise IT leaders, security can no longer just be an afterthought. The cost of neglecting security is a constant reminder, as we continue to see high-profile data breaches regularly,” said Bindseil.
“Much attention has been given to cybercriminals who wish to gain access to corporate data. However, according to the Ponemon Institute, more than a third of all data breaches are caused internally, and they are frequently the result of employees mishandling sensitive data.”