Skip to main content

Posts

Showing posts from March, 2018

Navigating Social Media Safely: Do's and Don'ts for Banking

Introduction: The world of social media has transformed the way we communicate, connect, and share our lives. However, it has also opened the door to potential risks, especially when it comes to online banking. With cybercrime on the rise, it's essential to be proactive and protect your financial information while using social media platforms. In this blog, we will discuss the do's and don'ts of using social media with respect to banking and personal finance. Do's: Be cautious with friend requests and connections:  Connecting with the right people on social media is important for both personal and professional reasons. However, be cautious about accepting friend requests from strangers or unfamiliar accounts, as they may be scammers or hackers looking to gain access to your personal or financial information. Use privacy settings wisely:  Ensure that your privacy settings are configured to protect your personal information. Limit the visibility of your posts and personal...

What and why of Cyber Security

What and why of Cyber Security Cybersecurity refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorised access. Cybersecurity may also be referred to as information technology security. Criminals and criminal organisations around the world already have worked out, there is money to be made in cybercrime and that policing it, given the international nature of the crimes, is very difficult. Cybercrime has moved from the “conventional hacker” just being a nuisance with new viruses, etc., to criminals now harnessing that capacity to steal and extort. Cyber attacks primarily fall into two specific categories: breaches in data security and sabotage. Personal data, trade secrets and information linking to bids, mergers and prices are targets for a data security breach. Sabotage can take the form of denial of service attacks, which flood web services with false messages, as well ...