2 facts

Image by rawpixel.com on Freepik

In trying to simplify our daily interactions with technology we give control to companies to manage security on our behalf. One way big tech has tried to protect us is through 2 factor authentication, to prove we are who we say we are, but is it working and do we get a choice?

Rocky breach

Rocky breach 2

Random gifts arriving in the mail and reviews for goods and services that don’t belong under the name they were written. Personal fraud is part of a digital life but if this happens to you, report it, it helps us understand the financial and psychological damage. How can we possibly trace the source or keep track of the pervasiveness of cyber fraud. Have we managed to train ourselves to be cyber warriors in protection of our own data and therefore our privacy or is cyber fraud happening less?

Cyber sense – 2022 Reflections pt. 1

Cyber sense - 2022 Reflections pt. 1 3

Reflection is an analytical tool that contributes to growth, understanding and potentially, if you can take it far enough, future strategy. Faster Networks write fortnightly articles about anything newsworthy and of interest under the general umbrella of cybersecurity. We get wrapped up sometimes in cyber celebrities, think Elon Musk and Sam Bankman-Fried of late but … Read more

Hacksville

Hacksville 4

We have witnessed the relentless ease with which data is being compromised, stolen, held to ransom, we are also trying to legislate digital theft, not from the dirty, baseless criminals stealing it but from the companies that allow it to happen. A long read in The Guardian titled Ransomware hunters: the self-taught tech geniuses fighting cybercrime discusses how ransomware is an efficient crime with little accountability. Even if you pinpoint and arrest the criminal, the damage is far-reaching and ubiquitous and can be traumatising to those that have had their identity stolen.