Log in

Sign in with your email address and password:

No account? Sign up here.
Forgot your password? Reset it here.
Didn't receive account confirmation email? Request a new one.

Cyber Security – Be Safe Not Sorry

All this talk of https://twoggle.com/blog/how-to-create-a-blog-website/building websites and blogs lately got us thinking about the boring stuff – cyber security and all that jazz! Today, cyber attacks are both more sophisticated and more convincing, so if you are thinking about setting up an online presence for your bricks and mortar business, e-commerce enterprise or just casual net surfing, this guide tells you about some of the threats.

Cyber Security - Be Safe Not Sorry

From simple measures you can take yourself to software to offer stronger protection, this Twoggle toolkit will equip you with your cyber security needs.

What is a cyber security attack?

Cyber security is the protection of a computer, email or IT network. When a threat or assault to this infrastructure occurs, it is called a cyber attack. Ever get those emails from your long lost grandfather in Algeria and he just so happens to need fifty gees? Yep – that’s not grandpa Bill playing tricks on you; its a classic case of a cyber attack. Most of us are aware that these types of emails are fake and shift them straight to our virtual trash can, but there are other types of cyber security breaches that are much more elusive. These include-

Internet of Things


Phishing has progressed to be a very sophisticated type of data breach.¬†Defined as a deceitful attempt to steal a person’s private information such as bank details or passwords, phishing is a very common cyber threat. There have been some very high profile phishing cases including the World Cup tickets for Russia. The Federal Trade Commission alerted the public to a scam email that circulated this summer with the promise of free tickets. The purpose of this email was to obtain the recipient’s personal data; by filling in the ticket request form, they may share personal details to claim the “free” tickets.

To avoid phishing attacks be vigilant when surfing the net. Be wary of unfamiliar links, even familiar links! For example, if your bank sends an email asking you to log into your account, it is worth calling the 24-hour customer service line. If you receive an out of character email from an organisation that you conduct business with, pick up the phone and call them. As the saying goes, it is better to be safe than sorry.

Another good tip is to install a firewall which helps to filter the net nasties out. And watch out for those sneaky pop-ups!


Malware is a sneaky software that causes chaos to your IT network. Ever in work and get an email from IT alerting you to a virus? That’s malware right there. It is really important to invest in anti-virus software for your PC. Think of anti-virus software as a flu shot. If you don’t get your flu shot you are at risk of getting flu. The same can be said for those without anti-virus.

Malware can be detrimental to your computer, your website and ultimately your customers. An excellent example of a malware attack is Slammer. Back in 2003, this powerful virus slowed down the internet and disabled hundreds of Bank of America cash machines.

Internet of Things

Comprising of the physical objects outside of traditional internet connectivity sources (computers, smartphones for example) the Internet of Things (IoT) threats is so 2018. For example, Google Home and Apple i-Watch are well-known IoTs. A significant risk with IoT devices is embedded in their accessibility. Traditionally a person had access to their bank account via an ATM card. Now millions view their accounts and move money online. Nowadays, IoT networks provide potential attackers with even more avenues to rob you. Ever see that functionality on a smartwatch to add your card details? Going to the shop is a simple as tapping your wrist at the checkout now. Equally getting your bank account cleared out is as easy as misplacing your watch.

Yes, our world is getting smarter, and technology has pushed boundaries to inspiring levels. While this is exciting, it also opens us up for much more opportunities for cyber attacks.

When you do business online, in fact when you do anything online, always be cautious. Use strong passwords, watch out for suspicious activity and install a firewall!

Submit a Comment