Back
Cyber Security Training & Software for Companies | MetaCompliance

Products

Discover our suite of personalised Security Awareness Training solutions, designed to empower and educate your team against modern cyber threats. From policy management to phishing simulations, our platform equips your workforce with the knowledge and skills needed to safeguard your organisation.

Cyber Security eLearning

Cyber Security eLearning to Explore our Award-Winning eLearning Library, Tailored for Every Department

Security Awareness Automation

Schedule Your Annual Awareness Campaign In A Few Clicks

Phishing Simulation

Stop Phishing Attacks In Their Tracks With Award-Winning Phishing Software

Policy Management

Centralise Your Policies In One Place And Effortlessly Manage Policy Lifecycles

Privacy Management

Control, Monitor, and Manage Compliance with Ease

Incident Management

Take Control Of Internal Incidents And Remediate What Matters

Back
Industry

Industries

Explore the versatility of our solutions across diverse industries. From the dynamic tech sector to healthcare, delve into how our solutions are making waves across multiple sectors. 


Financial Services

Creating A First Line Of Defence For Financial Service Organisations

Governments

A Go-To Security Awareness Solution For Governments

Enterprises

A Security Awareness Training Solution For Large Enterprises

Remote Workers

Embed A Culture Of Security Awareness - Even At Home

Education Sector

Engaging Security Awareness Training For The Education Sector

Healthcare Workers

See Our Tailored Security Awareness For Healthcare Workers

Tech Industry

Transforming Security Awareness Training In The Tech Industry

NIS2 Compliance

Support Your Nis2 Compliance Requirements With Cyber Security Awareness Initiatives

Back
Resources

Resources

From posters and policies to ultimate guides and case studies, our free awareness assets can be used to help improve cyber security awareness within your organisation.

Cyber Security Awareness For Dummies

An Indispensable Resource For Creating A Culture Of Cyber Awareness

Dummies Guide To Cyber Security Elearning

The Ultimate Guide To Implementing Effective Cyber Security Elearning

Ultimate Guide To Phishing

Educate Employees About How To Detect And Prevent Phishing Attacks

Free Awareness Posters

Download These Complimentary Posters To Enhance Employee Vigilance

Anti Phishing Policy

Create A Security-Conscious Culture And Promote Awareness Of Cyber Security Threats

Case Studies

Hear How We’re Helping Our Customers Drive Positive Behaviour In Their Organisations

A-Z Cyber Security Terminology

A Glossary Of Must-Know Cyber Security Terms

Cyber Security Behavioural Maturity Model

Audit Your Awareness Training And Benchmark Your Organisation Against Best Practice

Free Stuff

Download Our Free Awareness Assets To Improve Cyber Security Awareness In Your Organisation

Back
MetaCompliance | Cyber Security Training & Software for Employees

About

With 18+ years of experience in the Cyber Security and Compliance market, MetaCompliance provides an innovative solution for staff information security awareness and incident management automation. The MetaCompliance platform was created to meet customer needs for a single, comprehensive solution to manage the people risks surrounding Cyber Security, Data Protection and Compliance.

Why Choose Us

Learn Why Metacompliance Is The Trusted Partner For Security Awareness Training

Employee Engagement Specialists

We Make It Easier To Engage Employees And Create a Culture of Cyber Awareness

Security Awareness Automation

Easily Automate Security Awareness Training, Phishing And Policies In Minutes

MetaBlog

Stay informed about cyber awareness training topics and mitigate risk in your organisation.

Father’s Day Tech Gadgets – Friend or Foe?

fathers-day-gadgets-blog-header

about the author

Share this post

Thinking of treating your dad to a tech gadget this Father’s Day? 

You may want to think twice as many smart tech gadgets on the market today are open doorways for hackers and cyber criminals.

Recent years have seen a mass increase in the development and production of smart gadgets also known as ‘connected devices’ as technology evolves at an exponential rate.

The number of these devices available on the market is expected to reach 50 billion by 2020 which is cause for concern considering that around half the British population are currently unaware that connected devices can be hacked. Internet of Things (IoT) devices are always a popular pick for the tech savvy dad but is it worth the risk and how can you ensure safety from a cyber-attack?

Below we explore the key risks attached to these devices while dishing out a bit of advice on how to get the best out of your gifts without any nasty surprises!

Vulnerabilities

Father’s Day Tech Gadgets - Friend or Foe?

So, where does the problem lie? Embedded operating systems such as those used in the likes of popular smart home devices are often not designed with security as a priority and therefore contain security vulnerabilities. These vulnerabilities provide lucrative backdoors and can reveal integral data such as names, personal details, and even financial details to cyber criminals. It’s not even just data that can be compromised, the entire device itself can be hacked and manipulated.

Father’s Day Tech Gadgets - Friend or Foe?

Connected cars are the way of the future and are slowly but surely starting to gain popularity. However, a controlled experiment conducted by a couple of hackers proved just how easy it can be for those with the right knowledge and skills to take control of a smart vehicle when on the road.

This experiment does not relate only to cars, but also rings true with other connected devices which can easily be manipulated to perform other unpleasant tasks. For example, smart devices have been hacked and used for espionage. This was the case in 2013 where a baby monitor using internet connected cameras was hacked, or even more recently the Cayla doll scandal in which a child’s doll was hacked and used to relay creepy messages to children.

Father’s Day Tech Gadgets - Friend or Foe?

It’s not just children that are being targeted in these attacks. There are increasing amounts of malware being created to target these android based devices and criminals are employing this to utilise smart devices when launching wide scale DDOS (Distributed Denial of Service) attacks on companies and organisations globally.  For example, in 2016, hackers took control of 152,000 consumer IoT devices to initiate a distributed denial of service (DDoS) attack on French hosting provider OVH. This allowed them to inundate the company, resulting in chaos for customers worldwide.

IoT devices can also be used to launch ransomware attacks in which the owner of a smart device must pay cyber criminals to resume service, for example to regain control of the thermostat in their home. They can also be used to steal personal data and details and used for fraud.

Our Advice

Father’s Day Tech Gadgets - Friend or Foe?

When mitigating the risk involved, we should be particularly wary of devices which use default passwords and provide infrequent updates. You can decrease the risk involved by changing the default password on the device before you begin using it, disabling unused features, modifying the privacy settings to ensure they provide top level security and being sure that the operating system is up to date.

Put simply, IoT devices are transforming our lives in terms of household tasks, entertainment, office work and beyond. From simple but smart door locks to connected lights and appliances, smart Bluetooth trackers, robot lawnmowers, to drones and smart speakers smart technology surrounds us and there is certainly no lack of choice when it comes to picking out the perfect gift! Ensure you are security savvy as well as tech savvy when selecting that gift this Father’s Day.

Interested in protecting your organisation from the kinds of cyber attacks we have explored in this blog topic? Why not get in touch with one of our friendly staff to find out more about how our solutions can help you and your business.

Other Articles on Cyber Security Awareness Training You Might Find Interesting

duckduckgo vs google EN

DuckDuckGo vs Google – 5 reasons why you should give up using Google!

You were not aware that DuckDuckGo is a search engine? Well, now you know. Since its founding in 2008, DuckDuckGo has made it its mission to develop a search engine that does not store or share personal data, quite unlike Google. Google’s business model is based less on data protection and more on personalised advertising. Without the storage of personal data, Google would virtually lose the air it breathes. However, Google is still the most used search engine, and there are reasons for that. Google does have one weakness, however, and that is data protection.
Read More »
dataprotection vs informationsecurity EN

Information Security vs Data Protection

Is this an issue for our ISO or our DPO, or is it much the same in either case? Who exactly is responsible for this incident, and is there a need to report it at all? In order to discuss the similarities and differences between information security and data protection, the first step is to define the two areas.
Read More »