Get in touch

CTA.svg
Send
Thanks!
Group_214.svg
prev.svgnext.svg

Hiding in plain sight

Cyber-attacks are meticulously planned and highly sophisticated – often initiated several months before the ‘hit’ and almost always without the victim being aware of any unusual activity
The risks are embedded within normal day-to-day activities making them difficult to identify
Connecting to an insecure shared network
Airport lounges, cafés, and hotels are high-risk locations with insecure networks
Just because a network is password protected, does not make it secure
A malicious actor on that same network would be able to monitor your activity and build-up a picture of your digital life, tracking your online habits
If your network is not secure anyone could be watching you
Network Impersonation
A network you regularly connect to can be cloned by an attacker. This means they can:
Gain your log-in credentials
Prompt you to enter specific details
Gain access to your other accounts
Once you’re connected to the network, the attacker knows when you’re there and when you’re not

Malicious email communications

A highly sophisticated, targeted communication designed to extract information or action from you that provides the attacker with the information to typically action a financial fraud
Malware can be deployed in the form of an email attachment such as a PDF or a spreadsheet, designed to exploit your device when opened, installing key-loggers, ransomware or virus
Attacks are meticulously planned to fit in to your routine and minimise the risk of exposure and maximise the chances of success. For example, you may be expecting to receive a communication at a specific time, requiring you to make a payment or financial transaction
Attackers, with access to your digital life and monitoring your habits, would send a near identical communication just before. They will alter the destination of funds to an account they own and complete the fraud before you have had a chance to realise

Overseas insecure network

Globally there is huge disparity between development and network infrastructure. Unlike the UK and EU, many countries have not developed robust privacy laws, and have poor cyber hygiene
This increases the frequency and likelihood of exposure of personal data and common vulnerabilities which, in turn, heightens the risk of your traffic being intercepted and read
Malicious URLs
To facilitate their objectives, attackers make use of domain names both in an overt way (malicious URLs) and a covert way (domain impersonation)
It’s easy to be fooled by domains that look identical to legitimate websites of well-known brands. Famously, apple.com was subject to such an attack