Category Archives: Security

The Benefits of Expertise: Advantages of Choosing Professional Burglar Alarm Installation

When it comes to ensuring the security of our homes and businesses, installing a burglar alarm is a crucial step. While there are various options available for DIY installation, opting for professional burglar alarm installation offers several distinct advantages. In this article, we will explore the benefits of choosing expert installation for your burglar alarm system.

Enhanced Security Features and Configurations

Professional burglar alarm installers have extensive knowledge and expertise in the field. They are well-versed in the latest security technologies and can recommend the most suitable burglar alarm system for your specific needs. By choosing professional installation, you gain access to advanced security features and configurations that may not be readily available with off-the-shelf DIY alarm systems.

The Benefits of Expertise: Advantages of Choosing Professional Burglar Alarm Installation

Expert Advice and Customization

One significant advantage of professional installation is the expert advice and customization that comes with it. Professional installers have in-depth knowledge of security principles and can assess your property to identify any vulnerabilities or specific requirements. They can tailor the burglar alarm system to meet your unique needs, including zoning, sensors, and control panels, ensuring optimal protection.

Quality and Reliability

When it comes to the security of your property, quality and reliability are of utmost importance. Professional burglar alarm installers work only with reputable suppliers and manufacturers, ensuring that the system they install is of the highest quality. Additionally, they have the expertise to install the system correctly, minimising the risk of malfunctions or false alarms.

Certifications and Compliance

Professional burglar alarm installers are well-versed in local regulations and standards regarding alarm system installations. They ensure that the system they install meets all compliance requirements, including relevant British Standards and industry certifications. Choosing expert installation ensures that your burglar alarm system is installed in accordance with all applicable regulations, providing peace of mind and avoiding any potential legal issues.

The Benefits of Expertise: Advantages of Choosing Professional Burglar Alarm Installation

Expertise in Wiring and Integration

Proper wiring is crucial for effective and reliable burglar alarm systems. Professional installers have the expertise to handle complex wiring and integration tasks. They can seamlessly integrate the alarm system with other security features, such as CCTV cameras or access control systems, providing a comprehensive security solution for your property.

Maintenance and Support

Choosing professional installation ensures that you have ongoing maintenance and support for your burglar alarm system. Professional installers offer regular maintenance services to ensure that the system remains in optimal working condition. If any issues arise, they have the expertise to identify and resolve them promptly. Additionally, they typically offer support services, including troubleshooting guidance and emergency response, further enhancing the security of your property.

Insurance Benefits

Many insurance providers offer discounts on premiums for properties with professionally installed burglar alarm systems. By choosing expert installation, you may be eligible for these insurance benefits, potentially reducing your insurance costs in the long run. Professional installers can provide the necessary documentation and certifications to support your insurance claims, ensuring a smooth process and maximising your savings.

The Bottom Line

Opting for professional burglar alarm installation offers numerous benefits for your home or business. From enhanced security features and customization to expert advice and ongoing support, professional installers are well-equipped to provide you with a reliable and effective burglar alarm system. 

Additionally, complying with local regulations, integrating security features, and potentially lowering insurance costs are added advantages of choosing expert installation. When it comes to the security of your property, investing in professional installation is a decision that pays off in terms of peace of mind and comprehensive protection.

The Next Generation of Indoor Cameras is Here

Introducing the New SimpliSafe® Smart Alarm Wireless Indoor Security Camera

SimpliSafe®, maker of award-winning home security systems, today announced the launch of the Smart Alarm Wireless Indoor Security Camera. The camera is SimpliSafe’s most advanced camera yet and works seamlessly with the award-winning SimpliSafe® Home Security system* to make sure every inch of your home is protected around the clock.

Designed with advanced motion detection with vision AI, it’s the only indoor camera that can trigger an alarm and sound a built-in 80 dB siren for fast intruder deterrence. Instant phone alerts warn you the moment your camera detects unusual activity, so you’ll always know what’s happening at home. It can also tell the difference between people and pets, for fewer false alarms.

With 1536p HD video capture and 10x digital zoom, the new camera allows you to watch over your home in crystal clear detail both day and night. You can live stream, record, and download videos of your home on your mobile device, anytime, anywhere with the SimpliSafe® App.**

The Next Generation of Indoor Cameras is Here
The Next Generation of Indoor Cameras is Here

The camera provides privacy when you want it and protection when you need it with the automated privacy shutter. The SimpliSafe® system has three different modes – off, home and away – and this camera will integrate with the system’s modes and automatically adjust the privacy shutter depending on the setting, whist you can also adjust this via the app.

Like the rest of the SimpliSafe® system, the setup is simple. The camera is wireless, so you can easily mount it to a wall or place it on a shelf, giving you the flexibility to get the best vantage point.

A 10-foot USB charging cable is included in the box, giving you the option to have a permanent power source and eliminating any worry about recharging the camera.

The Next Generation of Indoor Cameras is Here
The Next Generation of Indoor Cameras is Here

The Smart Alarm Wireless Indoor Security Camera is £139.99 and is available from SimpliSafe.co.uk.

The camera launch comes off the heels of the SimpliSafe® Gen 2 Motion Sensor which launched earlier this month. Similar to the camera, the Gen 2 Motion sensor has the advanced ability to distinguish between people and pets, with the aim to reduce false alarms.

Ways To Protect Your Businesses Data

Whatever sized business you have, whether it’s a one-man-band or a multinational, you have to invest in protecting your data. The web is filled with malware and cyber criminals all looking for a way into your precious data gold mine. If they are successful, then this could cause you a lot of problems. You are also vulnerable to powercuts or other such breaks in the normal running of things. Data is precious, yet at the same time quite vulnerable. Threats can come in many forms, and the consequences of this may be enough to put a business, especially a small one, out of business. However, with the right procedures and security, you can protect your business from this ever-growing threat.

Ways To Protect Your Businesses Data
Ways To Protect Your Businesses Data

Security Audit

It may be in your best interests to work with a professional and audit all your IT infrastructure. You need to know exactly what needs to be protected, so you are able to secure it appropriately. Think about the computers, backup system, any mobiles devices you may use, and the network. All this needs to be assessed in order to protect it fully.

Encryption

In the event that you have something stolen, encryption is a valuable asset. That is because no one will be able to access the data on a hard disk or thumb drive. You may lose the physical hardware but the data will be safe a secure. 

Outsource Security

If you do not have the capabilities to have a fully comprehensive security solution in-house, it is wise to outsource. Firstly you will know that your data is being properly protected by professionals who do this day in and day out. You will not have to worry that something was set up incorrectly. If there are any problems, you know they will be able to come and fix them straight away. Also, in the long run, it will save you time, money, and a lot of potential stress.

Use multiple-security solutions.

To protect against cybercrime, aka hackers, and their ever more sophisticated techniques, you need multi-layered protection on all the devices you have. A multi-security solution will be able to block attacks targeting your network, and it will notify you of this issue, so you are able to take immediate action. If you implement the right solutions, a hacker will see that your security is more trouble than it is worth. 

Server Protection

If you don’t have a server room with the associated backup, your data requires you may experience a whole range of issues. A server room keeps things at an ambient temperature to avoid the problem of over-heating, for example. They can also provide additional power should you suffer from a blackout which could result in the loss of a lot of data. You should consider data centre ups solutions. In an age where energy reduction is paramount, you should be thinking about ways to reduce your carbon foot front too. With this sort of solution, there is scope for you to balance your power output and make it more cost-effective.  

Three Ways To Spot A Phishing Email

Phishing is one of the most common methods of cybercrime, but despite the fact that we all know about scam emails, people often still fall victim to these scams.  Thousands of phishing emails are sent every year and a vast amount of data breaches come from scam emails. Phishing has been used for all kinds of scams, from gaining access to your bank accounts to coronavirus scams that ask you to pay for tests. There are some ways that you can spot a phishing email, so you can avoid having your information stolen or being scammed out of your money. 

One: The Message Is Sent From A Public Email

No genuine organisation will send emails from an address that ends with ‘@gmail.com’, or another free email service, not even then companies that own these email services. 

Only very small operations won’t have their own email domain and all organisations will have company accounts. If the domain name matches the sender of the email, this is a good sign that the email is genuine. If you get an email from your bank from a Gmail address, that’s definitely a fake. 

The simplest way to check what the domain name of an organisation should be is to search for the company on Google. 

Look at the email address, not just the sender. Your inbox will display a name, like the name of your bank, along with the subject line. When you open the email, you will think you know who the message is from, and can often skip checking the email address to just read the content. 

When a scammer creates a fake email address, they often have the choice to choose the display name, which doesn’t have to relate to the email address at all. This means that a scammer can use a bogus email address that show up in your inbox with a convincing display name.  Unfortunately, sometimes this is enough to trick people. 

Two: The Domain Name Is Misspelt

Scammers are wise to the problem of domain names, and there are clever ways to get around not being able to send emails from the correct domain.

Anyone can buy a domain name. While every domain name must be unique, scammers can buy one that is remarkably similar to the genuine article. Perhaps they add a dash or change a letter that is hard to spot at first glance on a small screen (swapping an m for an n is a classic example). 

If an email seems strange, pay close attention to the domain name. If it isn’t spelt correctly, then it’s a scam.

Three: The Email Is Poorly Written

You can often tell that an email is a scam if it uses poor spelling and grammar. Phishing emails are automated and sent out to vast numbers of people. When these emails are crafted, scammers often use a spellchecker or a translation program. This gives them the right words but always used in the correct context. 

These are errors are often the kinds of mistakes that are common with people learning English. Any message claiming to be official that is written like this is almost definitely a scam. 

An email with a mistake is not always going to be a scam. We all make typos occasionally, especially when typing quickly. It’s up to you look at the context of the mistake and decide if it suggests a scam email or just a mistake made by someone in a hurry. Ask yourself:

  • Is this a common typo, like striking an adjacent key?
  • Is it a mistake a native speaker wouldn’t make, like words in the wrong context, or grammatical incoherence?
  • Is the email consistent with previous messages you’ve received from the sender? 

If you’re not sure if an email is genuine, even after looking at these clues, you should contact the sender, via another method of communication. You could check on their website, call them, speak in person, use an instant message option, or use an alternative email address. They can either confirm that the email is genuine, or you can make them aware of the scam, so they can take action and prevent other customers from being scammed too. 

It’s important for individuals to learn to spot a scam email. Spam filters can only do so much to catch attempts at phishing, and it takes a human to look for signs of something suspicious in the context of an email. Learn the signs, and be aware of what you’re opening or clicking. 

Gadget Man – Episode 164 – Debunking the COVID-19 / 5G Conspiracy Theory

Yesterday myself and industry expert, Dario Talmesio, Principal Analyst & Practice Leader at Omdia spoke to James Hazell on BBC Radio Suffolk about the COVID-19 / 5G Conspiracy Theory.

You can listen to the stream above or read on to find out more.

5G has been under attack by conspiracy theorists for as long as it has existed. Every conceivable disease, illness or cancer has been blamed on the technology. It has been open-season for several years.

During this time, every single theory has been repeatedly debunked by teams of scientists and experts throughout the world, but still, it prevails.

Enter Coronavirus Disease 2019 (COVID-19), the highly infectious disease caused by Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) first discovered in December 2019 Wuhan, China.

At the time of publication, COVID-19 has infected more than 1.36 million people in 184 countries. Sadly, resulting in the death of an excess of 76000 people. This virus has become a global killer on a scale not seen since the Spanish Flu Epidemic of 1918.

Dario Talmesio
Dario Talmesio Principal Analyst & Practice Leader
Country UK – Image Credit OMDIA

At a time when our highly advanced telecommunications networks are one of the saving graces of the crisis, the last thing we need to hear is that people are beginning to try and link COVID-19 to the building of the 5G network. Worse, there are now acts of vandalism being enacted upon the newly installed equipment, damaging expensive equipment and putting peoples lives at risk.

This damage and continued encouragement from high profile celebrities have resulted in the UK providers issuing a joint letter to customers asking for the damage to stop.

Frankly, I continue to be exasperated by the need for every single thing that happens on our planet to be blamed on technology, government or secret societies! The sooner we knuckle down and work together to defeat this appalling virus in every way we can, the better!

Stay at Home, Protect the NHS and Save Lives

Open Letter to Customers from EE, O2, 3 and Vodafone
Open Letter to Customers from EE, O2, 3 and Vodafone

Don’t forget to LIKE, SUBSCRIBE, SHARE and COMMENT.

See you next time, Stay Safe

Matt

The Gadget Man – Episode 162 – Working From Home During the Coronavirus / Covid-19 Crisis

Such are the strange times we live in, many of us now face working from home for the first time along with caring for our children.

I have worked from home extensively over the past 20 years and I thought I would try and share some tips on how I have been able to work effectively in a home environment.

This morning I spoke to James Hazell at BBC Radio Suffolk about the trials and tribulations about working from home. Listen in to the stream to hear what I had to say and especially the advice at the end.

Stay Safe and Healthy

If you have been given a laptop to use at home, then there is a danger that you may find yourself sitting in an armchair trying to work and you will soon find this isn’t going to work well.

  1. Set up a work environment in a spare room or even your bedroom where you can away from disturbances and distractions as best as possible.
  2. Find a comfortable chair and if possible sit near a window so you can get fresh air while you are working.
  3. Set up your computer, so that is a semi-permanent environment and will allow you to separate work from home and give you a place to ‘go to work’
  4. Get dressed, you don’t go to your place of work in your pyjamas, so again, getting dressed gets your prepared for work.
  5. Take plenty of breaks. If you have children at home, you will need to be able to give them attention. If you can set specific times during the day to stop work, get up and walk around and make yourself a drink.
  6. Try to begin and end your work-day as you would if you were going to your place of work. Let your employer know that these are your work times. Setting these boundaries will mean that you aren’t on-call 24/7.
  7. Most home-working requires an internet connection. Over the coming months, our communications links are going to be under a great deal of strain. The video streaming services are going to be used extensively and this will put a great deal of pressure on internet connection speeds. Home internet is very different to work internet due to what’s called ‘contention ratios’, so you should be prepared for slower than normal connection speeds.
  8. Ask your employer to provide you with a mobile device that can be used as a ‘tether’. This means that should traditional broadband experience issues, you can fall back onto connecting to the internet by connecting via a ‘personal mobile hotspot’.
  9. Make sure all of your internet-connected devices are up to date. This means ensuring anti-virus is updated where applicable and any operating systems updates on your computers, set-top boxes, TV’s, IpCams etc are updated
  10. Keep all of your battery-powered devices charged up, but don’t leave mobile phones plugged in all of the time as the batteries don’t work as effectively if they all continuously charged.
  11. Use a trusted VPN connection to secure your broadband connection further. I recommend Ivacy VPN. Using a VPN or Virtual Private Network secures your connection.

Finally, regardless of whether you are working at home or not, you WILL find the number of scam calls you receive will increase, mainly because you will find yourself at home so much more. NEVER give out any personal bank details over the phone including PIN numbers or passwords. Ignore all automated calls and just hang up. These people care little for the health or financial wellbeing of their victims. If in doubt, speak to a trusted friend or member of your family before taking any action that will cost you money.

Stay Well and see you soon!

Matt
www.thegadgetman.org.uk

Gadget Man – Episode 154 – Protecting Small Businesses from Cyber Attacks

More and more businesses are being targeted by criminals who are hijacking there websites and online accounts in order to blackmail them.

Here I am talking to Georgie Jameson on BBC Radio Suffolk about what small businesses can do to protect themselves from these kinds of attacks.

Matt Porter, The Gadget Man speaking on Radio Suffolk

Gadget Man – Episode 138 – Universal Music and the Importance of Backing up Your Data

Keeping backup copies of your data has never been so important and only this week it has been revealed that a fire at Universal Music has resulted in the loss of the original master tapes of some of the worlds most famous artists.

To compound the issue, the backups were kept in the same vaults and seemingly perished resulting in the total loss of the original recordings of the likes of Buddy Holly, Eminem, Sheryl Crow, Tupac and Tom Petty (to same but a few!).

With digital photography now the primary method of capturing images, it is now more important than ever that these sometimes precious images are also kept safe. Hardware failure or loss of devices is more common than ever before, so multiple backups are extremely important!

Hardware failure is a real and present issue
Hardware failure is a real and present issue

Today I spoke to James Hazell on BBC Radio Suffolk about backups and my experience of how to keep your data safe.

To find out more, listen into the stream above. Don’t forget to Like, Subscribe and Comment with your experiences of backup successes and failures.

See you in the next episode!!

Matt

Keeping Customer Data Safe In Your Business

You’ve got a business, and you’ve got plenty of customers milling in and out of it every day you’re open and operating. Even when you’re closed, you’ve got an ecommerce website that allows people to order what they want from you whenever they want, allowing you to ship out products or services as soon as you’re next able to. It’s a great element to have to your business, and increases your exposure, outreach, and potential sales from these by tenfold.

But that means you’ve got a lot of data to keep track of at the same time. And this data is very important, so you need to keep it safe. So here’s just a couple of details to remember about storing customer data, in the safe and right ways.

 

Always Give Customers an Option

Whenever a customer comes through your ecommerce site, give them plenty of choice over how their details are used. Let them know how their information will be used whilst they’re on the site. Let your customers know they have the option to store their credit or debit details when they use your site, and that they also have the option for the system to forget all about their card. After all, it’s completely up to the person shopping with you whether or not you have their details on file, and you shouldn’t want it any other way.

Move On From Physical Storage

If you’re using physical storage to keep a track of your customer details, you might be missing a trick here. Not only do things like hard drives, USB sticks, and filing cabinets all have a maximum capacity to them, but they’re also quite hard to sort through. Flash drives alone have a huge risk to them, in that the data stored on them can be lost at any moment, and pieces are chipped away every time you log one in and out of your computer. And then you’ll have to look up a guide like https://setapp.com/how-to/usb-data-recovery.

So use cloud storage, or server based storage, instead. There’s a lot more room for expansion, and you can invest in private storage that only you have access to. End to end encryption, as well as the ability to search for the right files in seconds – it’s a real upgrade to have a look into at least.

Keep Outside Connections to a Minimum

If you’re looking to stay safe and secure in the modern day and age, you need to be sure as few people as possible have access to your company files. Especially the customer details you have stored for ease of access on both sides of the screen. So make sure only a select few people have the passwords or keys to the storage, and make sure only secured WIFIs have access.

Customer data is a priority. Security is a big part of maintaining business longevity, so it needs to be something you prioritise in your quest to take your company higher.

Gadget Man – Episode 124 – Keyless Car Theft Explained and How to Stop it

How many of us own and drive a vehicle with a keyless entry system? Well, it appears that many thousands of us that do have woken up this morning to a very worrying report from the General German Automobile Club (ADAC),

In order to unlock your keyless entry vehicle, you simply need to carry your key-fob. As you approach the vehicle, it recognises the encrypted signal transmitted from the fob. This, in turn, instructs the vehicles central-locking system to unlock the doors when you either touch the door handle or press the button on the door-handle. There is no requirement to insert the key into the ignition as the car is fitted with a start/stop button. If you own a car with both keyless entry and start/stop system, you aren’t alone, they are now widely used in hundreds of models or cars and in some cases motorbikes.

Now for the bad news. A recent study by the General German Automobile Club (ADAC) has discovered that the technology is far from secure in all but THREE cases and in fact the method of stealing a keyless vehicle is extremely simple.

In order to steal a keyless vehicle, a thief simply employs a rudimentary transceiver which takes the relatively weak signal transmitted and received from the fob to the car and amplifies it, it is then possible for the signal to reach from the fob to the car and hey presto, the car is unlocked and can (in most cases) be started.

[videopress VxMJuooi]

Once the car is running, the need for a key is obsoleted and the car can now be driven until it is depleted of fuel. In most cases, the cars are taken abroad and the retrofitted with standard locking and start systems. As long as the car does not stall, it will run for as long as the fuel tank will take it.

NO AMOUNT of hacking or decryption is needed, it is reliant solely on the amplification of the already transmitted signal!

Arnulf Thiemel, car-technician at the ADAC.
Arnulf Thiemel, car-technician at the ADAC. Image Credit: ADAC

Arnulf Thiemel, car-technician at the ADAC, said “The ADAC demands that vehicles be protected against any kind of manipulation and illegal access. For the affected vehicles, there must be solutions put in place to improve the security.  All new  vehicles should also be equipped with a methodologically that ensures secure safety solutions which also withstands neutral side checks”

Which cars and manufacturers were affected?

Unfortunately, it would appear that EVERY manufacturer tested has at least one model which could be stolen using the method above.

Alfa Romeo, Audi, BMW, Chevrolet, Citroen, DS Automobiles, Fiat, Ford, Honda, Hyundai, Infiniti, Jaguar, Jeep, KIA, Land Rover, Lexus, Mazda, Mercedes, MINI, Mitsubishi, Nissan, Opel, Peugeot, Renault, Seat, Skoda, SsangYong, Suzuki, Subaru, Tesla, Toyota, Volvo, Volkswagen and motorcycles from BMW, Ducati and KTM. 

The following vehicles could NOT be opened using this method but if already open it was STILL POSSIBLE to start and drive the cars.

BMW i3 (2014)
Infiniti Q30 (2016)
Mazda 2 Skyactive 90 Kizohu (2018)
Volvo XC60 T5 (2017)

The following vehicles could NOT be opened or started using this method.

Jaguar i-Pace (2018)
Land Rover Discovery (2018)
Land Rover Range Rover (2018)

The vehicles above are currently immune from this method of attack. This is because they employ a variation of the keyless system by broadcasting using ultra-wideband frequencies. Basically, the equipment used to amplify the signal is ‘currently’ unable transmit or receive at the radio frequencies used in these models of cars.

Jaguar-Land Rover filed the patent for this method of keyless access in 2017. We can now only hope that they freely license these patents to other car makers or a comparable technology can be developed.

What Now?

All too often our deep-rooted human needs to be ‘waited upon’ result in solutions which in the first instance appear to solve a problem that really didn’t exist, but in real-world use turn out to have a sting in the tail. In the case of the study by ADAC, it would appear that there are very urgent questions to answer and drivers should be aware of the security issues surrounding their vehicles.

Faraday Cases?

Prior to speaking to BBC Radio Suffolk, many listeners talked about using Faraday Cases or Bags to house their keys. The theory behind this was to block the signal completely whilst the car isn’t in use (ie. whilst the keys were stored in the home or place of work).

Faraday Bag for Keyless Fobs from Amazon

I personally believe that keeping the keys away from the car or placing them in a container which COMPLETELY blocks radio signals is the only way to avoid the potential theft of vehicles using this method. However, radio signals can travel through types of metal, so be ABSOLUTELY confident that anything you purchase to secure your fobs, does indeed work as described.

Immediate Steps to Take

If you are concerned about the security of your keyless car fob, contact your car’s manufacturer as soon as possible and ask them what steps they have taken to secure your car? Ask them if there are software updates to improve security? Ask them if these systems can be deactivated until such time as they can be completely secure?

Listen in!

This morning I spoke to Mark Murphy on BBC Radio Suffolk about the use of Faraday Cage technology to try and reduce the chances of Keyless entry cars being stolen. Listen in to the stream above. If you like what you hear or read, don’t forget to LIKE, SHARE and SUBSCRIBE. See you next time!

Matt
The Gadget Man

I previously spoke about this topic a while back, you can read and listen at this link Gadget Man – Episode 113