Clinton, Tesco and How to Avoid Becoming a Victim

Posted by siteadmin on Wednesday 23rd November 2016.

The past month has seen the subject of email and cyber security (or lack of it) become the biggest global story as well as leading the UK’s news agenda.

Many commentators have put President Elect Donald Trump’s victory down to a late surge of support following the FBI’s new decision to investigate. And then quickly clear Hillary Clinton for using her own private email server whilst serving in office.

The investigations raised concerns on a number of levels. Firstly a trust issue where Americans were asking themselves what Clinton had to hide with all those emails that went missing. Secondly and the point we’ll address here of security.

Her private email server was according to experts likely to have been far more hackable than her official one. By using her personal server her critics slammed her judgement and integrity and it was mud that appeared to stick.

Closer to home Tesco Bank was targeted in what was one of the biggest cyber attacks on a bank or financial institution in history. Thousands of customers had a total of up to £2.5m stolen from their accounts.

Both incidents highlighted why we should take our digital security very seriously. You wouldn’t dream of going on holiday and not checking that you'd locked up your house properly. Or parking your car up with valuables on display. The same care and attention needs to be applied to your digital online security

As our financial lives move more and more online, the threat of digital fraud grows greater and more cunning. An increasing number of people are falling victim to email scams which have been nicknamed phishing. It’s a technique which tricks the user to reveal confidential information such as passwords and pass codes.

Another example is where I received a call from a colleague in a club I’m a member of not so long ago about an email I'd supposedly sent. The email requested that he transfer some club funds to my personal account. It didn’t sound right and it turned out the chap who received this supposedly from me, had had his email account hacked and where the attacker had figured who he and I were to then make what looked like a legitimate request. 

The phishers, or better known as hackers, use a wide range of tactics but there are some steps you can take to prevent becoming a victim.

Click here for nine ways of how you can protect yourself.

Archive