247 Detectives

Please Call NOW 0845 520 4121 / 07017 411 007

Please Call NOW 0845 520 4121 / 07017 411 007

Content Area 1

1st Call Detectives Blog

Get the latest information & news from the industry...

Archive +

Tags

Archive by Date

Cyber security: 9 key concepts explained

by Josef Kafka

An interesting case erupted earlier this year between the FBI and Apple, manufacturer of the iPhone. America's Federal Bureau of Information requested that Apple assist it in unlocking certain phones in order to extract information from the phones that might assist the bureau with its investigations. Apple point-blank refused to assist with this collection of confidential information from its customers, saying that it had "implications far beyond the case at hand". 

Apple v FBI is just the latest in a swath of stories relating to the gathering of data from private mobile conversations and being transferred way beyond their original context. If anything, Apple's stance defending our all-important right to privacy struck some as surprising amid a sea of freely exchanged big data but the incident was also a reminder of the difficulties involved in keeping your private information secure in this day and age.

With a maze of jargon and data to wade through, the field of cyber security is far from straightforward. Here are some essential concepts to understand to make sure you don't put your business at risk:

1. SSL 

When sending confidential information in electronic files, make sure you use an SSL encryption protocol. SSL stands for 'secure sockets layer' and is a very common way of transferring information without a third party being able to intervene and work out the contents of the file. So it's like a code that can only be deciphered by your addressee. On our website at 1stcalldetectives.com we offer a brand-new encryption certificate that will ensure a new higher standard of security for your data.

2. https/http

Websites, too, can be easily vulnerable to security attacks and this is why you should always be vigilant when giving out your personal details online. If the web address of the page you are accessing begins with 'https' instead of 'http', this means there is a secure connection between you and the website provider and it is safe to enter your details, without fear of having them stolen by a third party.

3. VPN and secure tunnel

If you're working on a mobile device or second computer, it's advisable to use a virtual private network (VPN) or Secure Tunnel when sharing files between the machines. This, again, is to avoid the data being made insecure through the transfer.

4. Hacking

Not just the subject of sci-fi stories, hacking is alive and well and every day there are stories of companies having their data exposed into due to insufficient security measures. It's important to keep abreast of and learn from case studies in order to prevent this happening to your business.

5. Secure communications

Without secure messaging, your data can be easily accessed by anyone. Make sure you are using secure messaging applications to make sure it remains safe. 

6. Security v convenience trade-off

These two concepts appear to be diametrically opposed to each other within the world of data security. A strong password requirement is, on the face of it, a good idea, but if it causes everyone to forget their passwords, or to expose them by, say, writing them down, the system is not working so well. 

7. Security protocols 

These are the software-based security credentials used in computers and mobile devices to prevent strangers from accessing their data. In the Apple v FBI case it was revealed that the FBI had found a way to bypass one level of the iPhone's security protocol (getting past the screen lock) but needed help getting into the places where the data was stored. All businesses should stay on top of about the security protocols of their devices, what they are set up to prevent and where their security flaws and vulnerabilities lie. 

8. IP Bill 

Here in the UK, spying on phones has been a hot topic since the phone-hacking scandal unfurled in 2011. A bill introduced by Theresa May, currently under scrutiny in the House of Commons, concerns the operation of law-enforcement and intelligence services with regard to intellectual property in the interception of communications. It has been called the Investigative Powers Bill or IP Bill (and also nicknamed 'the Snoopers' Charter'). The bill would require phone and internet providers to collect and store records of all customers' communications, with a view to potentially using them for investigation purposes. 

There have been complaints about this invasion of the privacy of many millions of innocent people and it highlights the fact that, even in the UK, this wholesale accumulation of data on British citizens' private lives by government is a project that is gaining ground. Security is becoming more and more essential. 

9. Internet of Things (IoT)

This is the name given to all the other devices, other than computers and phones and tablets, that all communicate via the internet. From Wi-Fi speakers to car dashboards to fitness trackers, our lives are increasingly full of these communicative objects and this means an ever-growing mine of data to keep track of. Your computer may be safe, but how about your toaster, your watch, your TV? 

For all your cyber security needs contact 1st Call Detectives and we'll help you protect your data.

Leave a comment
Areas & Postcodes We Cover
  • NW7, NW9, NW4, NW11, NW2, NW10, NW6, NW3, NW8, NW5, NW1, N20, N12, N3, N2, N10, N6, N8, N19, N7, N1, N5, N4, N16, N15, N17, N18, N11, N14, N21, N9, N13, N22 
  • E4, E17, E18, E5, E10, E11, E8, E9, E2, E1, E14, E3, E16, E6, E13, E15, E7, E12, SW6, SW10, SW5, SW7, SW3, SW1, SW14, SW13, SW15, SW20, SW19, SW18, SW17, SW16, SW12, SW2, SW9, SW8, SW11, SW4
  • EC4, EC1, EC2, EC3, SE1, SE11, SE17, SE16, SE5, SE15, SE14, SE8, SE24, SE22, SE4, SE21, SE23, SE26, SE20, SE25, SE19, SE6, SE12, SE9, SE18, SE2, SE28, SE7, SE10, SE3, SE13 
  • W1P W1M W1N W1R W1S W1T W1U W1V W1W W1X W1Y W1K W1J W1H W1A W1B W1C W1D W1F W1G W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14
     
  • © All rights reserved 2014 '1st Call Detectives'
  • /
  • Website designed & devloped by evokeu