Frequently Asked Questions


FAQ


Why Should I Care About Cyber Security?


Cyber crime and cyber espionage can affect anybody and everybody: from the solo entrepreneur working to commercialise or patent an innovative idea or product, or, even families who communicate over the internet with published pictures of their family members online, all the way to large multi-billion dollar nanotechnology companies.

In modern society, technology is everywhere. You may be working towards ending world poverty, achieving world peace, creating sustainable and clean energy, or more simply doing your banking or emailing your family; technology enables all of that. Secure technology is essential to avoid negative consequences ranging from plane crashes, power outages, identity theft, fraud, espionage and warfare.

The bottom line is that if you care about the safety of the information you have, whether it's a billion-dollar idea, or the privacy of your children and family or avoiding credit fraud, you would be wise to invest in Mossé Security’s cyber security to protect yourself. We have a variety of comprehensive, very low-cost plans to satisfy your needs. Stay safe with an ongoing yearly plan from us.

How Can I Protect Myself?


The first step is to call Mossé Security immediately. We will analyse your specific situation and explain how online attackers operate, what their thinking is, and what they want from you. We will also provide you with a comprehensive plan outlining the strategic and tactical steps we recommend to immediately protect yourself or your organisation. Prevention is the best way to start defending against cyber security threats and preventing them from becoming incidents.

In the case of a breach, Mossé Security provides coordinated assistance with local, national and international law enforcement agencies.

How Much Should We Invest Into Cyber Security To Protect Our Organisation?


Economically speaking, a good starting point is to think about investing between 10% and 20% of the value of the data or intellectual property that you wish to protect. For example, if your intellectual property is valued at 1 million dollars, you should invest between one hundred and two hundred thousands dollars to protect it. Then again, there are things that are beyond any monetary value, such as protecting privacy, and for individuals, the pictures and personal information of your family members, including children.

What Are The Main Cyber Threats?


Cyber threats can be grouped into four main categories:
  • Cyber Crime. This includes cases in which computers are used for criminal purposes such as fraud, extortion, piracy, theft, or used as tools to commit traditional offenses (e.g., defacing or denial-of-service attacks).
  • Cyber Espionage. This includes cases in which competitors deliberately target the economic intelligence, namely trade secrets, of their competitors. Trade secrets include financial, business, scientific, technical, economic or engineering information, client lists, research documents, prototypes or plans for new products or services, and personnel records.
  • Nation-State Espionage. This includes cases in which governments intrude into and ex filtrate large amounts of sensitive government data from adversaries’ government agencies and/or military industrial base, or engage in espionage against commercial interests.
  • Cyber Warfare. This is a discrete category of actions by governments or terrorist groups that constitute acts of war.

How Does Hacking Work?


Online assailants have access to cyber weapons that are either free because they have been published on the Internet, or do not cost much to build or acquire.

Without the proper IT security practices and technologies, intruders only need to find and exploit one or two weaknesses in computers to gain access to all of the files, folders, emails and databases of organisations. Anything that connects to a power plug can be hacked and then used to attack everything and everyone else on the network.

Online attackers are sophisticated: they can bypass firewalls, evade anti-viruses and intrusion detection systems, furthermore making that individual invisible on the network so that they can steal everything that matters from an organisation and never be detected.

How Can I Tell If I Have Been Hacked Or There’s Been A Breach Since It May Be “Invisible”?


The first step is to immediately call Mossé Security at the first sign of any or all of the following:
  • Any email that has magically gone missing
  • IT systems have stopped working for no apparent reason
  • You've noticed that the speed of your network has considerably slowed down
  • Your website content has been maliciously edited
  • Your competitors seem to know your business strategy and/or are magically beating you to the business deals
  • You have discovered hidden listening devices in your office, car or home
  • Your IT systems are being sabotaged
  • Some of your data is being published by hackers on the Internet
  • You wake up to see you've made the news and the world is reporting that you have been hacked