Smart Home Automation


Does your digital life need a spring clean?

1 September 2019 Smart Home Automation Information Security

Your private information is the most important thing you own. Your address, telephone number, ID, and banking details are worth more than their weight in (digital) gold. With the right information, cybercriminals can easily gain access to private aspects of your life and exploit that for monetary gain. In today’s digital world, it's essential to maintain a tight grip on your digital security.

And it’s for good reason: our latest research found that South African firms reported an 88% increase in phishing attacks: criminals are trying to steal your information from you through some clever and not-so-clever tactics. Where an email-borne attack was successful, nearly one in three suffered a direct financial loss, 28% lost customers and, for 27% of organisations, some employees lost their jobs as a result of the security breach.

Spring has sprung, and it's a good time to do a quick spring clean of your personal online security. Here’s how:

Nine easy ways to protect your information

1. Protect and change your passwords – Remembering a long and complicated password can be a chore, but it's an important part of digital security. Be sure to update your passwords at regular intervals and not to share them with anyone else. The best advice is to use a password manager so that you don’t have to remember a whole list of passwords for different sites. If you don’t use a password manager which creates a random password, at least have a password that's longer than eight characters and isn't the word "password."

Ideally use a passphrase e.g. “thequickbrownfox” rather than a known word like “fox” (which is susceptible to a dictionary attack). Use a mix of upper- and lower-case letters, numbers and special characters. However, be aware that password hacking software is not fooled by simple tricks like “P@ssw0rd” And don’t use the same password across all your accounts – if one becomes compromised, it will put all of them at risk.

2. Two-factor authentication – Most services, such as online banking, offer two-factor authentication. When accessing your information, you'll be prompted to enter your password along with a unique code that is sent to your phone or emailed. Sure, it's an extra step when you're desperate to buy a new coffee machine online, but it's a crucial one. It's much harder for hackers to use your credit card number when there's an extra layer of security.

3. Be careful of links – Did someone email you a link to a funny video and the message looked a little strange? Did a random company say you've won a competition that you've never entered and requested that you just "click here?" Be careful, hackers could be trying to install malware on your device and gain access to it. Be wary of emails, SMSes and smartphone notifications asking you to click on links.

4. Make sure your software is up to date – Phone or computer updates may seem pesky, interrupting your work or YouTube videos, but those updates are absolutely necessary. Software companies aren't creating updates to waste your time, but to plug any security holes they may have discovered and reinforce the system. Make sure your software is set to auto download and install the updates.

5. Lock-down your device – It's not just your online passwords that need protecting; your device needs protection too. Be sure to lock your PC or phone with a password that only you'll know, enable biometrics (such as fingerprint scanning), and don't leave it unattended and unlocked.

6. Regularly scan your device – Most operating systems, like Windows, come pre-packaged with anti-virus and security software. These pieces of software should always be up-to-date and allowed to regularly scan your device for threats. However, most standard security features are not adequate by themselves to protect you, so invest in additional layers of security by investing in specialist email and web security software.

7. Don't rely on big companies – You shouldn't just rely on big companies to keep your information safe and secure. While corporations often have massive security departments who try to stop digital threats, they're not invulnerable to attacks. Just look at the recent British Airways hack that exposed the personal details of half a million customers and prompted regulators to issue a R 3,3-billion fine. Keep a close eye on your service providers and, if one has been hacked, quickly change your passwords.

8. Have a heathy sense of distrust – It's not uncommon to receive a phone call from someone saying they're your internet service provider or bank, asking a range of personal questions. It's okay to say "no" to giving out info if you feel uneasy. Most banks have strict policies over the type of information they request from customers either via phone or online. If you feel unsure or uncomfortable, end the call and dial your bank’s call centre call. You'll easily be able to determine if the call was legitimate or not.

9. Check if you have been compromised – A useful site is https://haveibeenpwned.com/. This site only needs your email address to check if you have an account that has been compromised in a data breach. They only tell you what data breaches contain your email, so users will physically need to go to those sites and change their password. Never re-use a password that was exposed in a data breach as these are re-used by hackers in credential stuffing attacks on other sites.

Put your personal security first

It is essential that you put your personal security first, as well as the security of those around you. Make sure your family, friends, and company understand cybersecurity and why all of their information needs to be protected. Chat to your colleagues at work: one malicious link or attachment shared among colleagues can easily compromise internal systems and cause devastating financial and productivity losses.

Spend some time this Spring to spring clean your personal security and ensure you can use the benefits of digital technologies without putting yourself – and your colleagues, friends and family – at undue risk of cybercrime.




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
GenAI fraud forcing banks to shift from identity to intent
AI & Data Analytics Information Security Financial (Industry)
The complexity and velocity of modern fraud schemes, from deepfakes to fraud and scams involving social engineering, demand more than just investment in new tools; they need adaptability and expanding the security net.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved