Frequently Asked Questions

We have put together a selected list of questions we commonly recieve below.

List of Questions

You should change your password every few months, it limits how long a stolen password is useful to a stealth attacker and how long he/she has access to your account. If someone steals your password and you don't know about it, the attacker could steal your data, important account details and glean all sorts of information about you and your business.

Changing your password, means really changing the whole password rather than adding a further letter or digit to an existing password, this is always very tempting to do, but it means that the hacker will be able to access your information in a matter of minutes and completely negates the process of changing the password in the first place.

With so many of our personal and banking details stored across a number online platforms it’s no surprise that hackers have sought to harvest them for their own profit.

If you think your information may have been compromised, don’t panic. There are some easy-to-follow steps you can take to lessen the risk of any harm emerging from being hacked. Just follow the five key tips below

Change your password

The two most commonly sought pieces of information by hackers are your email address and password. Since most people use the same two details across many websites, the same two lines of text can unlock several different accounts. If you change your password, the value of your email address is significantly lessened. (see how often should I change my password for tips on this).

Reclaim your accounts

Every major online service offers a means to recover your account once it has been compromised. To ensure the protection of your personal data, you should follow this process for every account that’s related to a hacked email address or password.

Notify your your business and all your contacts you’ve been hacked

This happens more often than you think - this is something that needs to be reported immediately. Do not try to solve the problem yourself, report it to the IT department or get an IT professional to help solve the problem. Remember the longer the breach is left unresolved the more damage the hacker or virus can do.

Keep an eye on your bank account

In the worst case scenario, a hacker will use your email address and password to access the credit card details of those accounts they’re linked to. Any of their purchases will show up on your bank statements, so be sure to notify the relevant parties if anything suspicious does turn up.

Scan your computer for malware

Assuming your email has been breached, it’s safe to assume your computer might be infected with malware too. To eradicate this problem, use your pre-installed software or as mentioned above report it to your IT department or take your computer to an expert that will be able to ensure the malware is removed from your hard drive and ensure you don't have any other malicious programmes that have been installed, like keystroke software which is used to discern any extra passwords you may use.

Please contact Action Fraud They will be able to assist more.

Make sure your patches and updates for your machine are the latest versions. Also make sure you have an up-to-date antivirus and anti malware installed on your machine. Scan your machine daily and remove any threats that have been detected. Always make sure you install software from an approved vendor or source. If in doubt use a sandbox.

Make sure you always check the email address and links within the email. Make sure the certificates match the website and also check that the images and spellings are correct. Many fake emails tend to have spelling mistakes, which makes it easy to catch them out.

Two Factor Authentication, also known as 2FA, two step verification is an extra layer of security that is known as "multi factor authentication" that requires not only a password and username but also something that only the user has on them, i.e. a piece of information only they should know or have immediately to hand - such as a physical token.

Using a username and password together with a piece of information that only the user knows makes it harder for potential intruders to gain access and steal that person's personal data or identity.

Historically, two-factor authentication is not a new concept but its use has become far more prevalent with the digital age we now live in. In February 2011 Google announced two factor authentication, online for their users, followed by MSN and Yahoo.

Many people probably do not know this type of security process is called Two-Factor Authentication and likely do not even think about it when using hardware tokens, issued by their bank to use with their card and a Personal Identification Number when looking to complete Internet Banking transactions. Simply they are utilising the benefits of this type of multi factor Authentication - i.e. "what they have" AND "what they know".

Using a Two Factor Authentication process can help to lower the number of cases of identity theft on the Internet, as well as phishing via email, because the criminal would need more than just the users name and password details..

As more and more people and businesses live out their lives on social media, the threat of being exposed to cyber crime grows larger everyday. Social media has brought us all together, help build our business relationships and personal networks, made us more productive and up to date on business news and current affairs.

However with these advantages goes hand in hand with certain disadvantages, cyber security criminals have flocked to social media sites, these criminals are looking to exploit weaknesses in your social media profile, seeing an opportunity to steal personal information, company data, spread malware for future attacks and defraud unsuspecting users.

Here are just some of the privacy dangers social media users are confronted with on a day to day basis:


-Facebook Likejacking: using intriguing posts often referencing current events to trick users into clicking on a   malicious or phishing link.
- Rogue apps: which could lead to spam, phishing or malware via Facebook
- Facebook Chat attacks: which can spread malware via unsolicited links and promote phishing apps
- Spammy Tweets and malicious Twitter links: representing a major threat to micro bloggers

There are several reason that training is key to the process of securing your personal systems and any business from cyber crime.

With the right training, all of your employees become aware and educated about all of the different threats that could compromise your systems or your day to day business. With this knowledge comes a commitment from your staff that they are doing all they can to keep themselves and the company safe from cyber crime.

Cyber crime and cyber security is a dark and scary place for most of us from front of house staff to board member levels. This kind of crime is something that a lot of people don't want to hear about or don't believe will happen to them.

Giving your staff the training and knowledge they need to be able to understand what cyber crime and cyber security is all about will help to demystify what is perceived as a dark art. This will empower your employees to avoid exposing the business and themselves to this kind of crime.

More Questions?

Contacts

Metrix Cloud
27 Old Gloucester Street
London, WC1N 3AX
P: +44 020 3876 3644