You’re on your own

September 2015 News & Events

I had a strange experience recently. I have been a ‘member’ of an online site for some time, a few years actually, in order to receive a weekly email from them. This was not an important site in that it held critical or sensitive information about me; all it had was an email address and a password.

The password I used was one I have been using for years and that I use on multiple unimportant sites simply because it’s easier to remember. My thinking is that all someone hacking that site would get was my email address and a password which would grant them access to many other unimportant accounts. The worst that could happen was I get a bunch of unwanted newsletters and spam, which I do anyway.

I recently decided to create a full profile on the site, which now includes more sensitive information about me, not bank details or anything like that, but personal details I would choose not to have floating around all over the world. And while the site has been well designed and thought through in terms of usability, when I decided I needed to change my password to something less easily guessable and also unique to the site, I couldn’t.

There was no way to change your password. And this is a commercial site that takes credit card numbers etc., but doesn’t offer you the option to change your password. I sent an email to the site’s support and received a response almost immediately – very impressive. The support person suggested I send my new password through to her and she would change it.

After all the breaches and exploits we hear of on an almost daily basis, why do companies that rely on online commerce in one form or another have no clue about security?

This got me thinking about my policy of using the same password for unimportant sites. Many people choose this option. Those who actually think about security use complex and unique passwords for banking or other important sites. But is that a good idea?

In today’s connected world there are few, if any sites of lesser importance. The reason criminal syndicates collect so much data, much of it irrelevant, is because every little bit of data they collect from one site can be linked to a little snippet of data from another site. A simple email address from an innocuous newsletter can, for example, be linked to a social media profile with work details or more personal information that can be used to build a profile of you.

Eventually all the little bits of data create a full profile of you and with this in hand, the syndicates have access to more than you would believe possible. And it’s not only your lack of security that puts you at risk. Just last week a site asked for my identity number, an unsecured, unencrypted site. Not only won’t they be getting my ID number, they won’t be making any revenue off me. It is inexcusable to put your clients’ data at risk.

Perhaps it’s because South Africa is not as litigious as America that companies don’t pay any attention to their customers’ information. After all, who is going to come after them when they put thousands of people at risk? There are some very smart people in various police departments, but there are too few of them to have a major impact. And with the country lacking a proper cyber security strategy, you and I are on our own.

So basically, look after your own information because nobody else will. Even if you’re an editor with a bank balance in single figures, money launderers still want your life because the Internet allows them to do their crime in bulk, damage many people, and get away with it.

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
Linear heat detection (LHD) from Technoswitch
Technews Publishing Technoswitch Fire Detection & Suppression Products & Solutions Fire & Safety
SecuriHeat LHD by Securiton prevails where conventional fire detectors reach their physical limits. It copes well with extreme temperatures and constantly high atmospheric humidity, while precise measurements are also possible when corrosive gases and contaminated air are present.

Read more...
From the editor's desk: A burning issue
Technews Publishing News & Events
      Welcome to the first publication from SMART Security Solutions devoted to the fire industry. In the BMI report, sponsored by the Elvey Group, released earlier this year, fire was the smallest component ...

Read more...
Effective fire and smoke detection using cameras
Hikvision South Africa XtraVision SMART Security Solutions Technews Publishing Dahua Technology South Africa Fire & Safety
Video analytics, spurred on by advances in image processing, enhanced fire and smoke detection capabilities while significantly reducing false alarms in surveillance cameras. Today, AI has further improved accuracy and minimised false alarms.

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Onyyx wireless alarm
Technews Publishing Editor's Choice Smart Home Automation
IDS has introduced Onyyx, a wireless alarm system engineered to provide complete system control via the Onyyx app or keyring, as well as seamless installation.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
From the editor's desk: Keeping them out, keeping you aware
News & Events
Alarm, intrusion, and perimeter protection have been part and parcel of South African society for years. Many years ago, a home alarm consisted of wires covering one’s windows, which caused an alarm ...

Read more...
Intrusion Selection Guide 2024
Technews Publishing Perimeter Security, Alarms & Intruder Detection
The Intrusion Selection Guide 2024 includes the latest products and solutions aimed at small, medium, and large operations that require reliable, easy-to-install, set-up, and use intruder detection technology that reduces false alarms but never misses an actual event.

Read more...