cimplBlog_banner.png

Cimpl Blog

Your Weekly Insights on How to Manage your Enterprise Digital Footprint.

My Online Account Was Hacked

Posted by Caroline Le Brun | January 16, 2014 8:39 AM

BYOD users are huge targets for hackers

A few weeks ago, I received an email from my cell phone provider telling me that I had an overdue bill. It further said that I could directly pay the amount due by clicking on a provided link to access a secure page. Unfortunately for Mr. or Mrs. Hacker, I always pay my bills with my online bank account; most of all, I was sure that I had paid the previous month’s bill on time.

Cimpl enforces security and governance resized 600

But not everyone is as paranoid and punctual as I am. And most people don't share my awareness of phishing tactics. It's easy to see how many people can fall for hacking attempts when you see the effort that con artists put into to impersonating your cell phone provider, your bank, or your boss when they write supposedly authentic emails. The mobility and BYOD environment increase the need to fight such hacking tactics at home and at work. The company Marble Security conducted a survey focused on the millenial generation (adults born between 1980 and 2000), asking them:  "have you ever had an online account hacked?" The results highlight the urgency with which CIOs must educate employees about online threats and hacking risks for companies. According to the survey, adults:

  • In the 25-34 age group: 26% had an online account hacked

  • In the 35-44 age group: 24% had an online account hacked

Awareness training is the best prevention

Hacking has thrived since the Internet was invented and it will continue to become more sophisticated to match technological advances. That’s why education and awareness are the best remedy. Everyone is at risk, even technophiles - hacking sophistication is simply increasing that quickly. We are all equally at risk!

Social engineering techniques (as such forms of hacking are know) like phishing or watering hole attacks are the main threats which target BYOD employees. For CIOs, their main purpose is to protect sensitive corporate data and to ensure that employees are aware and careful when they use their own mobile devices. Personal accounts, passwords, and profiles owned by the employees are delicate pieces of information that hackers can easily take and use to compromise a company.

The use of security software is recommended but it is important to note that hackers are also trained to circumvent the security features of such software. That’s why awareness training is a fundamental part of protecting against attacks. And what better way to see danger coming than to know how to spot it?

Security matters. That is why Cimpl was made to help you to clarify how your devices are used, when, and by whom. Cimpl software enforces IT governance through customized alerts to give you control of your telecom and IT assets. Now, track all your assets, services, and expenses with an all-in-one solution made simple.

For more information, visit our website or click below!

Checklist

 

Related articles:

Topics: BYOD, Security, IT Assets, Software

Written by Caroline Le Brun

As a 16-year marketing veteran, Caroline’s experience extends across multiple industries. Since she joined Cimpl, her successful marketing campaigns have increased the company’s online and community presence, in addition to Cimpl’s footprint and appearances in new or traditional media (such as the Globe and Mail). Caroline is a specialist in communication and social media. She works closely with analysts to keep track of and adapt to the trends and changes in the industry of IT: Technology Expense management, IT cost optimization, Technology trends. Her leadership conducts Cimpl’s marketing team toward ever greater achievements. Caroline is also an exemplary citizen. Outside of work, she is involved in TEMIA, the Dorval Day Camp, and other community organizations. She has a Bachelor’s degree in Commerce from Concordia University and a Master Certificate in Integrated online Strategies from the University of San Francisco Intensive Development program.

Follow Us!

Self-Assessement_Checklist
Customer Stories: Access now!

Subscribe to our Blog