Smart Home Automation


Staying safe in a digital world

1 October 2019 Smart Home Automation Information Security

From online transactions and banking to shopping and gaming, cyber attackers are methodically finding new ways of using your devices against you, making each one of us increasingly vulnerable.

In order to have a positive and safe experience in the digital world, we need to understand the ever-increasing diversity of digital threats and equip ourselves with the necessary knowledge and skills. Unfortunately, too many users/consumers are oblivious to the threats and how quickly cybercrime is evolving.

Hackers are no longer as interested in breaking through firewalls or systems just to show they can. Their focus has shifted to theft of personal information and identity theft for financial gain, with phishing being the most common method used to trick/deceive you into disclosing your data.

According to the ‘2018 Norton Cyber Safety Insights Report’, 37% of consumers globally experienced cybercrime with malicious software being the most common cyber-related crime experienced. The report further highlights that less than half of consumers globally have taken any measure(s) to protect their personal information and online activities.

The information below will assist to stay abreast of the risks and to anticipate and safeguard us against some of these threats.

Protecting information online

Companies learn a lot about consumers/users through the data they collect from online activities which assists them in understanding consumer behaviour and developing personalised offerings for targeted advertising. This includes data on preferences when shopping online, social pages that are liked or followed, media channels that are used and the personal information included on social profiles.

Another dimension to the digital world and online activities is sharing – users share news, information, events, pictures, experiences and a lot more to build and maintain relationships as well as create new ones. Staying safe and secure in a digital world can be difficult. Not all hope is lost though, and there are some simple measures you can take to protect yourself and your information online:

• Be aware of the threats and understand the risks of going online. It is important to be conscientious and not assume that you are safe.

• In this regard, be cautious with online surveys and competitions as some of these may be scams designed to obtain your information.

• Carefully consider what information you choose to share online, including on social networks, chat rooms and other online media.

• Be careful not to post something that you do not want everyone to see; remember once it’s online, it is there permanently.

• Always use your best judgment: never disclose personal information and keep company information and workplace matters private.

Clearing or disabling cookies

We have all seen the message 'This website stores cookies on your computer' while browsing the Internet. So what are cookies? An HTTP cookie is a small piece of data sent from a website and stored on the user's computer by the Web browser while the user is browsing.

Cookies were designed to be a reliable mechanism for websites to remember a record of interaction information or to record the user's browsing activity. While cookies cannot infect computers with viruses or other malware, the danger with cookies is that cyber attackers can hijack cookies, and therefore browsing sessions, and track individuals' browsing histories.

Take care to ensure that if you are using a public computer/device, you should delete cookies when you have finished browsing so that subsequent users will not have access to your data (sent to websites) when they use the browser.

Business Email Compromise (BEC)

BEC is a type of attack where a cybercriminal compromises or spoofs a corporate email account of an executive/senior member of staff to defraud the company, its employees, customers or business partners.

In recent years, the amount of BEC attacks have significantly increased, with the FBI’s Internet Crime Complaint Centre putting global BEC losses in excess of $12 billion over the last 5 years (2013-2018). BEC attackers rely heavily on social engineering tactics and trick unsuspecting employees with well-worded, very specific email requests that appear legitimate.

While there are many variations, the attack basically entails targeting employees with access to company funds/finances and tricking them into making transfers or payments to the bank accounts of the cybercriminal/fraudster. Requests typically impersonate senior employees and include an element of urgency and a request for confidentiality.

The same modus operandi is also used to target customers or business partners.

BEC prevention measures that can reduce this risk include monitoring networks for suspicious emails, encrypting emails, diligently checking the sender details, independently confirming requests with the sender and most importantly, employee training given BEC attacks rely primarily on employees’ vulnerability.

Email and connected devices

In some cases, risk-avoidance behaviours by users do not seem to extend to how email and connected home devices are used. Case in point: approximately half of all users cannot distinguish between a real or scam/fake email or are operating their home devices with limited or no protective measures in place.

Frank Abagnale, the subject of the book and film ‘Catch Me If You Can’ states that, “stealing your identity is like counting to three.”

The reality is that we are all at times careless with our information or likely to accept certain risks online. Taking a few basic steps will, however, go a long way to protecting yourself and your privacy:

• Remember the essentials such as ensuring your devices’ operating systems are current and security software is installed and updated.

• Verify the authenticity of a website before entering sensitive or personal information. Check for ‘https’ indicating a secure site or look for the padlock icon, or lock icon, in the address bar.

• Think before clicking on links, opening attachments or installing software from unknown sources – if you absolutely must, first verify that the communication is genuine.

• Use complex passwords and change these regularly: for passwords, longer is stronger, however, avoid choosing real words, sequential numbers or personal information.

• Protect your home network, connected devices and smartphones by using two-factor authentication (2FA) on home computers, email accounts and smartphones.




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Bringing fire safety closer to home
SafeQuip Fire & Safety Products & Solutions Smart Home Automation
SafeQuip’s latest product launch introduces two compact, disposable fire extinguishers for everyday use, one suitable for Class A, B, and C fires, the other rated for Class A, B and F fires.

Read more...
Exhibitions across the security spectrum
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
HomeSec Expo has become the security industry’s premier trade event. Visitors will experience a live showcase of how different aspects of the security spectrum come together under one roof.

Read more...
A clear vision for a safer, smarter future
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
With its authoritative lineup of sponsors and exhibitors, HomeSec Expo 2026 embodies an authoritative, yet pragmatic vision, for the security industry. It is a vision that recognises both the urgency of current threats and the excitement of technological innovation.

Read more...
The role of safe storage in mitigating burglary and fire risk
Gunnebo Safe Storage Africa Products & Solutions Fire & Safety Smart Home Automation
Household burglary and fire remain amongst the most common threats to household assets in South Africa. Statistics South Africa’s 2024 Victims of Crime Survey reported approximately 1,5 million incidents of housebreaking in a single year.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved