Smart Home Automation


Don’t let your personal information become someone else’s business

1 October 2019 Smart Home Automation

The ever-growing use of social media and mobile devices by everyone has opened easy gateways for cyber criminals to steal personal information, identities, and money. Individuals are making it even easier for them by sharing too much online. This is according to Charl Ueckermann, CEO at AVeS Cyber Security.

“Information has become more valuable than oil, making it big business. Here we are talking about the average joe’s information. Any person with an online presence or some money in the bank has personal information worth taking,” he says, citing that the global data economy is estimated to be worth more than $3 trillion [1] while the total revenues for the oil and gas drilling sector was $2 trillion in 2017 [2].

“Cybercriminals are using social media platforms as spam and phishing tools and to spy on users. In the wrong hands, your personal information can be used against you. Users have had their accounts hacked and cloned, allowing hackers to distribute spam and other offensive content, as well as scam users out of money. Worse still, they can steal your identity. In essence, anyone’s business is their business.”

Ueckermann describes the trend to get tagged and liked on social platforms and the compulsion to overshare online as dangerous addictions. When done without forethought to privacy, people put themselves – and anyone connected to them online – at risk.

“Your Internet presence, if you don’t manage it carefully, can cause you some trouble. Social media and the Internet have become a reflection of real life, and everyone can have access to you and your activities. Your real-life audience is controlled and small in comparison to your online presence if not set up with caution. Whatever you share publicly is in the public domain, which means anyone can see it. They can see where you have been, what your interests are, who you are friends with, where you work, your contact details, what you look like, and so much more. This is personal information, your information, and it is valuable to cyber criminals, because the more information they have about you, the easier it becomes to impersonate you.”

The protection of personally-identifiable information (PII) is becoming an obligation with pieces of privacy legislation like PoPI (South Africa), GDPR in the European Union and the Information Protection Act (United Kingdom). There is an onus on companies to protect the information they store about their customers. Think about banks which must store bank account numbers, medical aid companies which must keep personal and medical information safe, and governmental organisations that must keep ID numbers on file.

“Yet, individuals are putting their personal information into the public domain every day. Thanks to Google, Facebook and other information platforms that have monetised the information they have retrieved from users, we have become more aware of our privacy. But, most people are not aware enough, and they are not doing much to protect their privacy,” says Ueckermann.

So, what should Internet and social media users be doing to protect their information?

Ueckermann says that any personally-identifiable information should be kept private by default and shared with discretion. This includes contact numbers, ID numbers, home addresses, and email addresses.

“Start by checking your privacy settings on the social media platforms that you use so that only your ‘friends’ and contacts have access to what you share. Screen the people you allow onto your social media profiles. If you don’t know them, should they really be able to see your life and your personal information?

“Secondly, watch what you share. Always think about what you share and how that information could be used against you if it landed in the wrong hands. Social engineering cyber criminals can often get your personal information with just a few data points, so the less you share publicly, the better.

“Thirdly, always use the most updated versions of social media apps and lock down your login by using authentication tools and not only usernames and passwords. Use complex passwords with a mix of lower and uppercase letters, numbers and symbols. Never use the same password across your social media accounts. Keep your passwords and usernames private.

“You should also install Internet security software and anti-spyware on the devices that you use to browse the Internet and connect with people online. This includes your smartphone and tablets. Make sure that these tools are regularly updated to protect your devices against intrusions and infections.

“Lastly, be wary about entering credit card and banking details on websites. Always make sure that the URL at the top of the page begins with https. The ‘s’ stands for secure. If there is no ‘s’, do not enter payment details on the website.”

Ueckermann concludes: “In this highly connected, digital world, it is unrealistic to say that people should not connect, share, transact and engage online. It is the way of the world. However, there is such a thing as oversharing, and there are common-sense limits to the type of information you should put into the public domain. Always think, ‘would I like a bank robber or a fraudster to see this’? If not, don’t put it out there. The responsibility to protect your information starts with you.”

For more information contact AVeS Cyber Security, +27 86 100 2837, [email protected]www.aves.co.za

Nadyseva, S. R. (2019, 02 01). Fair data marketplace for all. Retrieved from Worldbank: blogs.worldbank.org/digital-development/fair-data-marketplace-all

Investopia. (2018, 09 01). What percentage of the global economy consists of the oil and gas drilling sector? Retrieved from Investopedia: www.investopedia.com/ask/answers/030915/what-percentage-global-economy-comprised-oil-gas-drilling-sector.asp


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Onyyx wireless alarm
Technews Publishing Editor's Choice Smart Home Automation
IDS has introduced Onyyx, a wireless alarm system engineered to provide complete system control via the Onyyx app or keyring, as well as seamless installation.

Read more...
Unlocking new efficiencies in private security
Security Services & Risk Management Transport (Industry) Smart Home Automation Logistics (Industry)
Justin Manson, Sales Director at Webfleet, discusses how the urgent need to protect life, and to do so more efficiently, is driving continuous innovation in holistic home and residential security services in South Africa.

Read more...
Acronis’ True Image returns
Information Security Smart Home Automation
Acronis has announced its flagship product, Acronis Cyber Protect Home Office, is reverting to its original name, Acronis True Image, with the new version release.

Read more...
Same old cables, new intercom
Hikvision South Africa Products & Solutions Access Control & Identity Management Residential Estate (Industry) Smart Home Automation
Retrofitting old residential complexes with a modern two-wire HD video intercom system is more than an upgrade. For many homeowners and renters, these systems represent a leap into the future.

Read more...
Perspectives on personal care monitoring and smart surveillance
Leaderware Editor's Choice Surveillance Smart Home Automation IoT & Automation
Dr Craig Donald believes smart surveillance offers a range of options for monitoring loved ones, but making the right choice is not always as simple as selecting the latest technology.

Read more...
Regal fusses over Fluss
Regal Security Distributors SA IoT & Automation Smart Home Automation
When the team from Fluss brought their Bluetooth-enabled device to Regal’s research team, they were hooked. Effortless in its simplicity, the Fluss device means no more losing remotes, endless waiting at the gate for visitors, scanning fingerprints, etc.

Read more...
Is intelligence alone enough?
Products & Solutions Surveillance Smart Home Automation
By coupling intelligent algorithms with additional features and functionality, Secury360 ensures that users have ultimate control and flexibility over their security systems.

Read more...
Home security made simple
Technews Publishing Editor's Choice Surveillance Residential Estate (Industry) Smart Home Automation
Premium Brand Distributors unveiled the eufy Security and Anker PowerHouse products and solutions at Securex, including solar-powered home security cameras, video doorbells and power stations to keep users safe, without Eskom’s help.

Read more...
Relaxed home cybersecurity could render consumers accidental ‘inside actors’
Editor's Choice Information Security Smart Home Automation
Cisco security experts warn of snowball impact of relaxed approach to cybersecurity on personal devices, noting 60% of users primarily use their personal phone for work tasks and 76% have used unsecured public networks for work tasks.

Read more...
Kaspersky announces new consumer portfolio
Products & Solutions Smart Home Automation
Kaspersky has announced availability of its new, simplified consumer solutions portfolio, with an enhanced user interface and experience across multiple platforms.

Read more...