247 Detectives

Please Call NOW 0845 520 4121 / 07017 411 007

Please Call NOW 0845 520 4121 / 07017 411 007

Content Area 1

1st Call Detectives Blog

Get the latest information & news from the industry...

Archive +

Tags

Archive by Date

Computer security discussed at G20 summit

by Josef Kafka

When the leaders of the world's most powerful nations talk about IT and computer security, you know the issue is top of the global agenda. Replacing nuclear weapons and trade tariffs as a talking point, countries are talking about playing fair and not escalating a cyber war to a state where it could become cause for a real conflict.

While Theresa May might have been desperately trying to gather some support for her Brexit strategy, Barack Obama was trying to talk tough, stating that the US has a sizeable cyber weapon arsenal, but doesn't want to use it (http://www.theregister.co.uk/2016/09/06/obama_says_usa_has_worlds_biggest_and_best_cyber_arsenal/)

Instead he prefers a round of no-hack agreements with nations, that would see their official spy agencies avoid hacking each other. 

The hacks will go on

Of course, any such agreements completely ignore the private, pirate and rogue hackers, as well as hacking groups in third-party countries that are invisibly sponsored by other governments. These are still free to target any business, with increasingly powerful tools that can attempt to break into thousands of accounts or servers every hour. And that's assuming most states don't sign the piece of paper and carry on regardless. 

Russian and Chinese sourced hacks continue to plague American and western businesses, on the lookout for useful information, business ideas or technical data to steal, while random attacks will continue to be a scourge for all businesses.

Even when a hacking shop is identified, located and its command and control servers shut down, the perpetrators, let alone the government behind them, can be impossible to identify. The hackers will simply set up a new base of operations and start all over again. With the US election full of hacking stories (http://uk.businessinsider.com/the-greatest-threat-to-american-democracy-is-psychological-2016-9??r=US&IR=T) linked to Russia, likely looking to destabilise or weaken the candidates, hacking and data security has never had a higher priority. 

Fighting the hackers

Trying to block the hackers are nation states, private data security firms and talented white hat hackers. The best examples are in line for a prize in Britain's 2016 Cyber Security Challenge, looking to find the data protection experts of the future (http://www.computerweekly.com/news/450303717/Simulated-cyber-attack-in-London-adds-finalists-to-2016-UK-Cyber-Security-Challenge?). While they may represent a bright future in the fight against hackers, for the rest of us, the advice is to take every practical security precaution possible.

That starts with the basics like having strong passwords (numbers, capital letters and special characters) for all services you use, and not duplicating passwords across sites. Many of us have been online for over a decade and have left plenty of dormant or defunct accounts around the internet. It just takes one of those databases to be stolen with a password you still use (and older databases had weaker or no encryption) to compromise your current accounts. 

To check if any of your existing accounts have been hacked, you can use the Have I Been Pwned service (https://haveibeenpwned.com/) that stores your email address and compares it against all recorded leaks, so you can see if you would need to change your other passwords. It will email you if your details come up in any future leaks or hacks. 

Why do you need to take these measures? Another popular US forum was recently hacked, this time associated with a porn site (http://thenextweb.com/insider/2016/09/05/hackers-ejaculate-800000-brazzers-accounts-onto-the-dark-web/#gref), and over 800,000 accounts were revealed. Users can expect plenty of spam blackmail attempts in their email inboxes, but the dedicated hackers will be trying user names, emails and passwords on dozens of other sites to try and access accounts. 

Staying safe isn't complicated

While adding a few characters to a password, or using disposable email accounts for non-essential services, might add a little extra effort to your day, most other personal data security requires little effort. Antivirus software and firewalls on your PC update themselves regularly and are free to use or available at low cost. Using a virtual private network will help encrypt your data when you are using an untrusted public network, when travelling or working in a cafe, for example.

Staying aware, and on the lookout for fake emails, websites and other threats is perhaps the most important thing that users can do to remain safe. Whenever you get a new piece of hardware, or sign up for a new online service, think about making sure you follow our advice on safe logins, and check websites for HTTPS:// headers in their weblinks (like our own site), these ensure a secure connection and are still easy to miss. Chrome's browser highlights such links with a green tab on the address bar, while Firefox has a green padlock icon to show the sites is safe.

Leave a comment
Areas & Postcodes We Cover
  • NW7, NW9, NW4, NW11, NW2, NW10, NW6, NW3, NW8, NW5, NW1, N20, N12, N3, N2, N10, N6, N8, N19, N7, N1, N5, N4, N16, N15, N17, N18, N11, N14, N21, N9, N13, N22 
  • E4, E17, E18, E5, E10, E11, E8, E9, E2, E1, E14, E3, E16, E6, E13, E15, E7, E12, SW6, SW10, SW5, SW7, SW3, SW1, SW14, SW13, SW15, SW20, SW19, SW18, SW17, SW16, SW12, SW2, SW9, SW8, SW11, SW4
  • EC4, EC1, EC2, EC3, SE1, SE11, SE17, SE16, SE5, SE15, SE14, SE8, SE24, SE22, SE4, SE21, SE23, SE26, SE20, SE25, SE19, SE6, SE12, SE9, SE18, SE2, SE28, SE7, SE10, SE3, SE13 
  • W1P W1M W1N W1R W1S W1T W1U W1V W1W W1X W1Y W1K W1J W1H W1A W1B W1C W1D W1F W1G W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14
     
  • © All rights reserved 2014 '1st Call Detectives'
  • /
  • Website designed & devloped by evokeu