Why do you still fall for online scams?

February 11, 2021

Most of us have grown up with computers being an everyday part of life. At work or at home computers and smart devices play an important role in daily life and most of us have learned to use them quite safely.


Yet despite an increase in general IT knowledge, people are still falling victim to cyber criminals and online scams – but why?


Scammers are getting smarter

Early email scams were very basic, such as the classic Nigerian 401 scam (also known as an advance-fee scam) which invited email recipients to obtain their share of some vast wealth. In return for a few thousand pounds, email recipients would be guaranteed several million in return.


As news of the scam spread, people became more aware of the dangers and now ignore such basic scams out of habit. So scammers have significantly improved their techniques. Phishing emails specifically designed to look legitimate have proven to be very effective, claiming thousands of new victims every year. More recently, hackers have been breaking into company networks and sending emails pretending to be co-workers, requesting sensitive data like passwords and company credit card numbers.


Cyberattacks are becoming more sophisticated

For major hacks, cyber criminals will invest months analysing their target and looking for weaknesses. This may involve breaking into hundreds of computers on the way to their goal; compromising your home computer may allow them access to systems at your office for instance.


These multi-stage attacks are very sneaky and can be hard to detect. Unless you know exactly what to look for (or using our protection plan services) it is almost impossible to spot what is going on.


We underestimate the risk

Because we have grown up with computers, we often underestimate the risk of cyber crime. If you’ve never (knowingly) been a victim of hacking or malware, you may think it won’t happen to you. It is very easy to become complacent over time – and that leaves us at risk of becoming targets.


There are plenty of reasons we make this mistake. If you’re working from home, you may assume your employer is taking care of cyber security for you. Or you use a free ad-blocking system, not realising that it doesn’t stop malware downloads (it may also allow some ads though deliberately too). Or maybe you’re bought into the myth that Apple computers can’t get viruses (they can).


In the same way you don’t leave your wallet and phone lying around, you always need to be at least partially aware of computer security. Pay attention and treat everything – emails, websites, software downloads – with a healthy degree of suspicion. Doing so makes you well prepared to block many common attacks.


How to stay safe

Dealing with these three problems is easier than you may think:


  • Download and install an effective endpoint protection tool.


  • Stay aware of what is happening on your computer and the internet – read you emails very carefully and never click any links if you are suspicious.



And if you have any specific problems right now, contact us today.


Follow Us

Be the first to know

You might also like

October 14, 2024
DevOps is a popular practice, especially among large organizations. However, while it comes with numerous benefits, it presents numerous risks as well. One notable challenge is the increased velocity of deployment, which often complicates how developers implement and ensure application security throughout the development and deployment process. DevOps is a popular practice, especially among large organizations. However, while it comes with numerous benefits, it presents numerous risks as well. One notable challenge is the increased velocity of deployment, which often complicates how developers implement and ensure application security throughout the development and deployment process. According to a recent survey, almost 80% of CIOs expressed concerns about the difficulty of discerning trusted elements from untrusted ones within DevOps environments. In particular, the pressure to deliver services at a faster pace sometimes prompts DevOps teams to take security shortcuts, resulting in potentially costly repercussions. These include data breaches, application downtime, and compliance violations.  So, how can you strike a balance between the demand for agile DevOps practices and the need to maintain robust security measures?
October 4, 2024
Testing applications for security flaws during production is a vital process of the development lifecycle, and this is where Dynamic Application Security Testing (DAST) comes in. DAST is a security testing approach in application security (AppSec), in which testers assess an application in real-time, while it’s actively running. This process can be conducted even without testers knowing the application’s internal interactions or system-level designs. Applications fuel the engine of the world’s economy, but enterprises can encounter substantial hurdles when striving to retain a competitive advantage in a rapidly changing digital landscape. Businesses must continuously pursue inventive solutions, even as they contend with sophisticated adversaries looking to exploit opportunities to disrupt operations, compromise vital information, and inflict harm. According to recent research, approximately 17% of cyberattacks aim to exploit vulnerable web applications. Yet, 98% of web applications are susceptible to attacks that can lead to malware infection or redirect users to malicious websites. All the while, 72% of these vulnerabilities result from coding errors. Testing applications for security flaws during production is a vital process of the development lifecycle, and this is where Dynamic Application Security Testing (DAST) comes in. DAST is a security testing approach in application security (AppSec), in which testers assess an application in real-time, while it’s actively running. This process can be conducted even without testers knowing the application’s internal interactions or system-level designs.  This is because DAST tools operate without access to the application’s source code. Instead, they emulate genuine attacks, akin to those carried out by real hackers, to identify security weaknesses. This “black box” testing method examines the application from an external perspective, scrutinises its runtime behaviour, and observes how it reacts to simulated attacks. These simulations help evaluate whether the application exhibits vulnerabilities and if it is potentially susceptible to malicious attacks.
September 25, 2024
In this blog post we look back at the origin of the term “hacking”, as well as how activities that might be described as hacking have existed throughout history, even prior to the advent of computer systems – and what if anything these can teach us today. Hacking is attacking and breaking into computer systems illegally… isn’t it? The meaning of the term “hacking” has in fact changed substantially over time, morphing from describing essentially benign (or at worst mildly disruptive) activities into its modern attribution to largely criminal and illegal activities. What’s more, in its original usage, “hacking” doesn’t necessarily even need to involve computer systems at all.  In this blog post we look back at the origin of the term “hacking”, as well as how activities that might be described as hacking have existed throughout history, even prior to the advent of computer systems – and what if anything these can teach us today.
More Posts
Share by: