Giving an in-depth analysis of cyber scams, social engineering and the health issues of using computer; providing preventive measures/solutions to these dangers in ICT.
Friday, 30 September 2016
Thursday, 12 May 2016
MOBILE PHONES CAN CAUSE SEVER ILLNESS
Mobile phones, no doubt is the biggest and
fast moving electronic gadget market in the world today. The International
Telecommunication Union had reported in 2011 that about 6 billion mobile phones
have been subscribed at the end of that year. This means that 86 out of every
100 people have mobile phones worldwide. It have become a clip of our society,
with every Tom Dick and Harry right from school kids to grown-up adults owning
at least a mobile phone. Although mobile phones have made life easier but its
negative effects are detrimental to users. Medical and ICT experts have shown a
lot of concerns about the negative effects associated with the use of mobile
phone.
Bacteria on Mobile Phones
Along with important information stored in
mobile phones are deadly bacteria which are easily spread ignorantly by the
user or owner of the mobile phone. An average mobile phone user puts his or her
phone(s) in contact with several places where it can come in contact with germs.
A research carried out in University of
London in 2011, shows that one in six mobile phones is contaminated with some
sort of fecal matter, probably because their owners did not wash their hands
with soap after using the toilet. E. coli,
a bacterium from fecal origin was found in some phones. Such bacteria
causes diarrhea, vomiting and sever fever when injected into the body.
Another research carried out by health students
at South University Columbia, found out that mobile phones
were frequently contaminated with methicillin-resistant Staphylococcus aureus (MRSA). Staph
aureus according to Dr. Robert J. Wolff “is always dangerous and MRSA forms
are worse because they cannot be stopped easily. Staph skin infections,
including MRSA, can quickly turn into deep, painful abscesses. The bacteria
might remain confined to the skin, or burrow deeper into the body, causing
potentially life-threatening infections in bones, joints, surgical wounds, the
bloodstream, heart valves, and lungs.”
If your hands are very dirty, there is
every tendency that your mobile phone would be highly contaminated with the
same type of bacteria found on your dirty hands at that moment. The public are
advised to maintain proper hygiene, keep their hands clean by washing with soap
and water. They can also use a hand sanitizer, and importantly, clean their mobile
phones often using a fairly dry towel and wipes that are safe to use on
devices.
Your Eyes maybe at Risk
Bright screens and tiny text character can
strain the eyes of mobile phone users and causes sever damage. It is important
for mobile users to constantly refocus and reposition the eyes so as to process
the text or graphics on the screen. This is because smartphones, tablets, and
other hand-held devices are designed for reading at close range. The higher the
use of hand-held devices, the more potential problems associated with vision. Symptoms
of digital eye strain include eye redness or irritation, dry eyes, blurred
vision, back pain, neck pain, and headaches.
The public are advised to follow the
“20-20-20” Rule. Which means, Take a 20-second break every 20 minutes when using
an electronic device and look at something 20 feet away. People should reduce
focus on the screen. They should make sure the screen is always clean and clear,
the surrounding light that is competing with the screen should be dimmed, and
there should be adequate distance between the eyes and the screen and also
increase the text character of the device.
Radio Wave Exposure
Radio waves emitted by mobile
phones transmit in all directions to find the nearest base station. It means
that some of the radio waves are directed at your body when you use a mobile
phone. Radio waves are absorbed into your body tissue as energy, which adds to
the energy being produced by your body's metabolism. There have been
speculations that the radiation from mobile phones can cause cancer and
infertility, however the only known effects of this wave in the body is a
little increase in temperature (about 0.2oC according to experts)
which is similar to normal rise in body temperature during rigorous exercise.
Monday, 9 May 2016
MOST COMMON WAYS CYBER CRIMINALS ATTACK BUSINESS SOCIAL MEDIA ACCOUNTS CUM PREVENTIVE MEASURES
About 95% of business enterprise and large
organizations today have a sizable presence on social media, including Twitter,
Facebook and LinkedIn, among others. While social networks can enhance customer
engagement and strengthen the company's brand in the marketplace, opportunistic
attackers looking to embarrass an enterprise, tarnish its brand, tap from her
resources or make a statement to the world have no better avenue than
compromising corporate social media accounts.
Here are the most common ways in which
attackers compromise social media accounts, and measures enterprises should
take to ensure they don't fall prey.
Secure social media management
Using social
engineering in phishing emails means an attacker doesn't
have to circumvent network perimeter defenses, rather they only craft a
credible and persuasive email that tricks the employee who manages the
organization's social media accounts into clicking a malicious link or
providing the password to the accounts.
Enterprises and organizations with a large
social media following must ensure that those employees responsible for social
media accounts receive security awareness training that
covers how to recognize and deal with social engineering-based attacks prior to
being given access credentials to corporate social media accounts.
This training should explain how social
engineers operate and the tactics employees should be on the lookout for. With
the proper training, these encounters should become second nature; the employee
should know to trash offers that look too good to be true or links requiring
login credentials, even if they appear to come from an internal address or
partner organization. Simple safeguards such as checking that the sender
actually sent an email with an attachment are invaluable. Be sure to keep
employees informed of the latest techniques being used in brand hacking attacks
such as phishing emails based on breaking news stories, both true and
fictitious. Enterprises must also put procedures in place for employees to
report unusual emails so that network surveillance can be stepped up and other
employees forewarned.
Emerging attacks and security controls
It's important to note that it's not just
social media account credentials that need safeguarding. A number of attackers
have successfully compromised social media accounts by subverting domain name system
(DNS) data. By capturing the login credentials of
people authorized to modify DNS records, attackers can redirect tweets, blogs
and other traffic to servers they control. Enterprise DNS administrators should
take advantage of security features offered by Registrars to control
modifications made to their domain.
Twitter itself has also put security controls
in place to help prevent hacking across its platform. A recent SEA attack
against Twitter was only partially successful as the company had implemented
the "Domain Lock" feature which prohibits certain changes to a domain
until it is unlocked -- a simple but valuable control.
In addition, two-factor authentication should be
introduced for both social media accounts and for those that control important
services like DNS. Out-of-band checks such as a security code sent to the
user's mobile phone can greatly reduce the chances of a phishing email being
enough to gain access to an account. Ideally, dedicated computers should be
used to access and update social media content so that additional security
checks and controls can be deployed on these systems to monitor for unusual
network traffic and keyloggers, which have become another suspected method
used by hackers to obtain social media account credentials.
It is critical to draw up an emergency
response plan to reduce the impact of a social media account breach, should one
occur. It is important that website administrators know which modules or
components within a site provide social media content so that they can be
quickly disabled should the need arise. This will also help prevent the need
for an entire site to be taken offline.
While social media is a great way for
enterprises to interact with their customers and strengthen their reputation,
companies that want to maintain trust in their brand must put forth the extra
effort required to stop them from falling prey to brand hacks and social
attacks.
Friday, 4 March 2016
BUSINESS ENTERPRISES AND SOCIAL MEDIA REGULATIONS/COMPLIANCE: THE NITTY-GRITTY
Social
media, being one of the fast growing electronic medium in our world today, has
become an essential tool for business success. A large number of organizations build
strong presence on social media with majority of them having many accounts on
Twitter and Facebook, which makes it easier for product branding,
communication, information sharing and building strong relationship with
people. Social media has come to stay. Those organizations or enterprises that
choose not to key into social media could be at a competitive disadvantage and
experiencing operational deficiency.
Social media has introduced complexities into the
business environment which now stands as a challenge to many organizations.
There are vast differences in functionality and cultural expectations on the
use of social media sites both personally and professionally. For instance,
Germany makes a distinction between private social media (Facebook, Twitter,
Instagram) and business social media (LinkedIn). Efforts are been made
by organizations and regulators to enforce appropriate compliance guidelines
for social media activities.
QUESTIONS BOTHERING ON SOCIAL MEDIA
The main issue that arises from using social media
in a business setting is that it alters the way we present ourselves, merging
our roles as people, professionals and consumers. As we share more of ourselves
on a growing number of social media platforms, questions quickly surface around
appropriate social media behavior - how often and on what social networks
should we post? When should we present ourselves in our professional role and
when should we share our personal opinions? Is it right to be social media
friends with co-workers, clients or a boss?
No doubt, these are complicated questions for
individuals and absolute puzzle for enterprises concerned with how employees
behave and interact within and outside workplace. Controlling employee’s social
media usage is even more difficult for enterprises. The questions now are, can
organizations dictate how their employees use social media? Can they monitor
social media conversations or use them to learn more about prospective job
applicants? When does the personal connection allowed by social media tools
cross the line from business to personal? To this end, regulators and
government agencies are revising specific guidelines, regulations and
laws relevant to social media management and oversight. Among them are; Federal
Financial Institutions Examination Council's (FFIEC) which proposes
"Social Media: Consumer Compliance Risk Management Guidance" and the
proposed European Union General Data Protection Regulation.
A security and risk analyst (Nick Hayes) has identified five common categories of
requirements that organizations must begin to address immediately to ensure
social media regulations and compliance.
DATA PROTECTION AND PRIVACY
The rise of social media is in large part to blame
for the growing controversy between privacy and appropriate personal
boundaries, which has caused heated debates between various regulators, as
people are willing to share more and more information about themselves in
largely public forums. At the same time, firms are investing in advanced
technology to harvest this data and convert it into actionable business
intelligence. To avoid potential conflict, organizations should evaluate how
they collect social media data and work to clearly address their intentions in
a public way, such as through their websites' public privacy policy statements.
EMPLOYEE RIGHTS
Approximately two-thirds of U.S. and EU
Web-connected adults are accessing social networking sites regularly. This
means that employees in virtually any industry are likely to use social media
in some form, which drastically increases a company's exposure to potentially
negative branding and reputational events. To address these concerns,
organizations can adopt policies to guide employee use of social media in some
form. However, they must be careful that these policies don't conflict with
country or state privacy laws, or other labor laws. In particular, companies
should be wary of how they monitor employees, restrict behavior through their
corporate social media
policy, and gather information for recruiting and hiring
purposes.
DISCLOSURE AND THIRD-PARTY ENDORSEMENT
A difficult issue posed by social media is how to
communicate sensitive, often complicated messages with limited words. Twitter
restricts messages to just 140 characters, for example, but organizations that
need to comply with the FTC, Food and Drug Administration (FDA) and other
disclosure requirements must ensure that all social media messages meet strict
specifications. What is considered acceptable practice depends on specific
regulations and how they deal with certain aspects of social media usage. For
instance, how long can a post remain on an account before it's considered an
endorsement? The FTC's guidance is less prescriptive and more about overall
intent, leaving it up to them to judge on a more case-by-case basis. The FDA,
on the other hand, has provided little guidance specific to social media, often
leaving its corporate constituents wary of pursuing an aggressive social media
strategy. Any organization that is planning a push into the realm of Twitter, LinkedIn and
the like should become familiar with the specific social media regulations and
compliance challenges that pertain to its company and industry.
GOVERNANCE AND OVERSIGHT
Employees across organizations are leveraging social
media to deepen customer relationships, improve team collaboration and
strengthen lead-generation efforts. In fact, Forrester has found that
career-driven information workers are almost twice as likely as the rest of the
workforce to use social media for business purposes. Considering these
statistics, firms are increasingly allowing employees to use social media for
business purposes, but regulators in some industries, such as FINRA and FFIEC,
now want to see that organizations develop proper internal procedures and
controls to ensure they manage associated risks effectively.
INFORMATION ARCHIVING AND RETENTION
Social media also presents new challenges for
organizations that are required to retain records of all business
communications. Namely, social content doesn't remain static; content creators
can edit or delete posts after they are published, and other posters can
comment and add to the discussion as well. Further complicating matters is
determining what content is considered "business" communication and
when that content should be captured and archived. Forrester recommends
determining the appropriate context of business communications first, and then
deciding which devices and applications employees are permitted to use and
under what circumstances.
The reality for most organizations is that social
media is not receding. In fact, it continues to grow and evolve at an alarming
rate. Consumers increasingly discover and communicate with businesses via
social media channels, and just as importantly, workers across many
organizations enjoy increased productivity thanks to the likes of Twitter and
LinkedIn. Instead of cowering from social media due to compliance fears,
enterprises should take the same precautions they've always needed to in the
past by focusing on all applicable regulations and putting the right governance
processes in place to comply with them. Organizations that are thinking about
and acting on such issues now can begin reaping the business benefits today and
avoid exposing the company to unnecessary risk later.
Friday, 12 February 2016
Companies’ Security and Social Media Attacks
In one of my previous articles, social media attacks and
individual security measures was discussed extensively. With the continuous
surging of enterprises going online because of the huge and easily accessible online market, hackers
and cybercriminals are shifting grounds and are increasingly turning attention
to companies, corporate organizations and government agencies through the
employees of these enterprises who are users of social media network. The bad
habits of users of social media have made the operations of hackers fast and
smooth without any hindrance to gaining personal data and fooling unsuspecting
victims.
Potentially, employees with little or no understanding of social media security pose greater risks for enterprise which among others, recklessly posting personal information online, which can be exploited by hackers and use in attacking the enterprise or organization. According to experts, exploiting social networks is easier for hackers because it is the path of the least resistance. Enterprise networks are becoming more sophisticated and conscious of cyber security, but uninformed employees using social media are more likely to fall victim to attacks because they don't know the value of their personal information or how much data they're actually exposing on the Web.
Hackers often carryout their operation by presenting scams in the form of news about fake celebrity death reports and sex tapes, unbelievable world news, must-see videos, free offers for smartphones, plane tickets, or gift cards. These spread rapidly on social media because people are more likely to click on links posted by a friend or if it has many shares and likes. This describes how individuals attribute more trust and value into something because it's been clicked on or approved by other users. Another security expect with Symantec (Samir Kapuria) said, "They're automating the ruse more through social media, so the victims are being brought right to the doorstep of the bad guys, they're using the power of social networking, along with the surge of mobile devices, and they're getting more efficient and effective with how they conduct their business."
Employees need to take appropriate precautions and measures to protect their identity because it can also affect their work environment. For example, when users fail to configure completely different usernames and passwords for social media sites, it can put their email accounts, bank accounts and especially enterprise accounts at risk. An employee should use a total different username and password for the company’s email accounts and that of social media networks.
The young generation should be properly educated on the dangers of social media so as to protect or limit the amount of information they share online. According to Bahadur, "Once they(the young generation) hit the corporate world, their online presence could be a disaster, and they won't understand the concept of privacy and sensitive data." Employees need to be aware of social media risks and recognize that overexposing themselves online can make them and their employers an easier target for hackers. "If there is gold over here, heavily protected, and silver over there, not protected, then the hackers will go after the silver, not the gold." (Christopher Budd)
Subscribe to:
Posts (Atom)