STORM CLAIMS: If your property has been damaged as a result of the recent weather conditions and you don't need us to take urgent action you can notify us online of your claim.

If you do require urgent action to be taken by us, call: 0800282652

STORM CLAIMS: If your property has been damaged as a result of the recent weather conditions and you don't need us to take urgent action you can notify us online of your claim.

If you do require urgent action to be taken by us, call: 0800282652

Ask the Expert - Eder Ribeiro

We asked Eder Ribeiro, Head of Forensics at CyberScout to dive into the world of cyber threats, protecting personal data and identifying fraudulent communications. 

What type of people are vulnerable to cyber attacks?

Everyone. However, cyber criminals will often be more attracted to certain types of people. High-profile individuals, for example, may present a more valuable target, while children and the elderly may be targeted due to their trusting nature and limited cyber security awareness. Cyber criminals deploy many different schemes and attacks, casting a wide net that is likely to be able to bring them financial gain or valuable information from just about any target.

What are your top three tips for staying safe online?

  1. Protect your accounts. Account take overs are the most common attacks and often the beginning stages for other types of attacks and scams. Additionally, your credentials are incredibly valuable to cyber criminals.
  2. Back up your data. Ransomware is widespread and often, individuals are either targeted or accidentally hit. If your devices are infected, you’ll need current backups to get your systems back up with minimal issues.
  3. Ensure devices are kept up-to-date and apply recommended settings.  One of the leading causes of cyber incidents is  the configuration on devices and systems not being kept up to date, so always activate or turn-on security focused configurations to increase security and always allow your devices/systems to auto-update. 

How should I store data? 

In at least two ways. We recommend having data stored in multiple formats in case cyber criminals compromise your computer. This could be cloud storage in conjunction with using an external USB drive (that doesn’t stay connected to your computers) or NAS device (a data storage device that connects to and is accessed via a private network). Consider what works best for you and your family’s lifestyle.

What are the most common cyber threats that individuals face today?

Account takeover is by far the most common. This is when a cyber criminal gains unauthorised access to online accounts to perpetrate fraud. For example, a criminal posing as an online bank helpdesk representative who then facilitates fraudulent balance transfers. Other threats include email compromise, which is when a criminal gains access to an email account allowing them to more easily trick people into transferring money or stealing data, and ransomware, which is designed to block access to a computer system until a sum of money is paid. 

What steps can I take to protect my personal data from being hacked or stolen?

Some little things and some big ones. 

  • Little: Ensure systems are up to date, use the very latest  antivirus products on all your devices and ensure you follow best practice when configuring devices.
  • Big: Use strong password management solutions like a dedicated password vault (a service that stores usernames and passwords for multiple applications securely and in an encrypted format) so you can create and use hyper complex passwords without the risk of having to memorise them all. Adopt strong forms of Multi-Factor Authentication* (MFA), such as passkeys or physical encryption devices.

Multi-factor authentication (MFA) is a security process that requires users to verify their identity using two or more different methods, such as a password and a fingerprint.

How can I identify phishing emails, messages, or fraudulent websites?

Pay attention to the sender details before you reply, particularly when a message or email appears to be from a legitimate sender. A fake address will often now display a different address than the one you first saw. If you receive an email from a company of someone you know asking for personal information or to click a link, then call them to check it’s a legitimate communication. Same with suspicious text messages or content via Direct Message in any social media platform. Also, don’t save passwords to the browser, ever!

What are the signs that I’ve fallen victim to a cyberattack?

If your systems become suddenly and unexpectedly slow. If people call you saying they received weird emails from you. If you lose access to accounts online or your personal settings are changed. If your online accounts have new devices (for any reason including Multi-Factor Authentication) added that you didn’t add or authorise to be added. If a cyber criminal starts to extort you, such as an attacker demanding a ransom for the release of your data that they have assumed control over, or threats of exposure of secrets, violence or harm.

When should I call the CyberScout Helpline? 

You can call with general online queries, if you are unsure as to whether something is a threat or not or if any of the above situations occur then call CyberScout without delay. As a Bespoke Home Insurance policyholder, you have access to the Cyber Helpline 24/7, 363 days a year.