Email Security

Blog

sales: 01344 567990

support: 01344 989530

Email Security

  • Human integration with technology and systems.

    Connecting all the time

    Andrés Lucero of Aalto University, Helsinki, Finland recently published ( arXiv:1804.04833 [cs.HC] ) his autoethnography about his period of times in his life that he has voluntarily lived without a mobile phone. Since 1999 he spent two separate periods (2002-2008 and 2014-2017) without a phone. Both related to when he was working in academia and cycling to work. Interesting points to note were that even during these periods he had access to wifi enabled tablets, but the need for authentication codes and secure communications were the key areas that were affected by not having a mobile phone. Additionally in Finland at the age of 7 children receive their first mobile phone and house keys so that they can travel to school on their own.

    With two factor authentication heavily reliant on mobile phones either for SMS/text codes or smart phone apps with authentication code production, it becomes more and more difficult to imagine the operation of today’s work environment without a phone. In one situation the service he was trying to use reluctantly ended up emailing the security details to an email address that they weren’t able to verify.

    Moving back in to the connected world and embracing all forms of device, including wearable, Andrés Lucero also had to learn how to cope with synchronous and asynchronous forms of communication such as Whatsapp, where in a group things are said and discussed through the night which aren’t for people sleeping to respond to until they want to.

    The paper makes for an interesting study, and demonstrates a number of situations where normal life is eased by the power of live connection. Eg. location and travelling directions, location based entertainment and two factor authentication services. The paper also shows how remaining in control of technology can help maintain control of stressors.

    For security all businesses should be using two factor authentication where they can, and with smart phones being one of the most popular methods the need for all employees having access becomes apparent. However there are alternatives, if you’d like to discuss please contact us below.

    #telanovaReporter

  • Your teams are being targeted

    Sharks circling targeting users

    Like spearing fish in a barrel.

    The sharks are circling.

    Advances in technology have seen great benefits to humankind as a whole. Each step forward for mankind, sees an additional step forward for the criminal underground.

    Machine learning is becoming more wide spread. If your company uses Adwords, you may well be using their own machine learning on which of your adverts performs better based on the demographic and information of the person they display the advert to.

    In the past many of us will have received an email purporting to be from a bank or parcel carrier that we’ve never used. You may well have become accustomed to saying to yourself, but I don’t have a Western Union account etc.

    What now if the machine learning was reading your public social media, of you and your friends and tailoring the email or social post to match what you wanted to see. Imagine if you suddenly saw a post on your social feed that said
    yourname
    I know you went to insert place last year and I wondered if you’d seen these photos of the place insert sample image ,
    catch up soon
    insert a name of a friend

    • How closely would you look at the poster's signature
    • Would you click and check out the photos ?
    • What if it said update your Adobe Reader / Gallery Pack software when you did ?
    • Did it all seem legit ?
    • What if on the gallery page you visit theirs more social engineering, such as donate to just giving page ?
    • What would your employees and friends do ?

    In research published this month shows that by using machine learning to facilitate socially engineered phishing campaigns they are achieving a 5-14% better rate of return.

    • How does a 5-14% higher chance of breach fare with your company?
    • When and how did you last assess your risk of attack?
    • What action have you taken to reduce that risk ?
    • Are you ready for the onslaught ?
    • What actions have you already taken to upskill your employees?
    • What packages are there that can assist you ?

    Want to know more, enter your details below.

    Enter your name, telephone and email address so we can contact you
    Name :
    Email :
    Phone :

We use cookies to provide you with the best possible experience in your interactions on our website

You agree to our use of cookies on your device by continuing to use our website

I understand