Do they get it, what will they do with it, whats in it for them . Who is hacking the hackers, the bots and whatnots. We have malware, ransomware, the dark red, white hats, black hats, grey hats, passwords, how many have you got . What is your mothers maiden name . Its all serious stuff. What are your thoughts and experiences . Share it and we have a panel of experts to share Cyber Security questions. What do you want to know and have you been hacked . . Good morning and good to know you are there. Richard foster has the news was Top Police Officers say they are extremely worried about the possible consequences of a major data breach in Northern Ireland. The name, role of every psni officer has been published online by mistake was that there are seniors dilly mcphee as dissident public groups could plot attacks. Six Water Companies in uk face claims they have overcharged customers. The trade body water body uk says the accusations are without merit. Thejoint uk says the accusations are
my details other way they could have access to my details. my account was actually book based, i had a book, it wasn t on a book based, i had a book, it wasn t on a card book based, i had a book, it wasn t on a card or book based, i had a book, it wasn t on a card or anything. it all went suddenly on a card or anything. it all went suddenly out of the blue, everything totally suddenly out of the blue, everything totally removed. i lost my faith in online totally removed. i lost my faith in online banking straightaway so i ust online banking straightaway so i just don t online banking straightaway so i just don t do it and haven t done it since just don t do it and haven t done it since i just don t do it and haven t done it since. i always go into the branch or use since. i always go into the branch or use the since. i always go into the branch or use the hole in the wall or whatever~ or use the hole in the wall or whatever- or use the hole in the wall or whatev
cyber security for 20 years now and it s fair to say myjob is safe. it is a it s fair to say myjob is safe. it is a growth it s fair to say myjob is safe. it is a growth industry. as you say, we are all is a growth industry. as you say, we are all doing is a growth industry. as you say, we are all doing so much more of our lives, are all doing so much more of our lives, including personaland lives, including personal and professional lives lives, including personaland professional lives online. but joe is absolutely right, yes, we are right is absolutely right, yes, we are right to is absolutely right, yes, we are right to be is absolutely right, yes, we are right to be concerned, but so much of what right to be concerned, but so much of what you right to be concerned, but so much of what you your listeners encounter in terms of what you your listeners encounter in terms of of what you your listeners encounter in terms of cybercrime and safety threats in terms o
people no longer have a legitimate reason to store our data, and if we ask them reason to store our data, and if we ask them specifically to take us off their lists, ask them specifically to take us off their lists, legally they are required to do so. it does require some required to do so. it does require some work required to do so. it does require some work on all our parts to check those some work on all our parts to check those apps. some work on all our parts to check those apps, delete the ones we don t use. those apps, delete the ones we don t use and those apps, delete the ones we don t use and in those apps, delete the ones we don t use. and in the case of people who might use. and in the case of people who might be use. and in the case of people who might be in use. and in the case of people who might be in coercive or abusive relationships, if you don t recognise an app on your phone, somebody recognise an app on your phone, somebody else might have put i
password there. i know that, don t worry. a foreign actor told me. what s best practice? the worry. a foreign actor told me. what s best practice? the rules, the basic rules that what s best practice? the rules, the basic rules that are what s best practice? the rules, the basic rules that are given what s best practice? the rules, the basic rules that are given out - what s best practice? the rules, the basic rules that are given out by - basic rules that are given out by the national cyber security centre and every cyber security expert says it s the basic hygiene of information security. for example, don t use the same password across multiple accounts because if one of those services, let s say it s an app those services, let s say it s an app you downloaded years ago that you only tried out once or twice and then deleted from your phone, if that company is hacked then suddenly they have your e mail, the password that you use for everything and that allows hackers to use simp