POLICIES

CYBER 123 Policies

OUR WEBSITE POLICIES

CORPORATE SOCIAL RESPONSIBILITY

Corporate social responsibility (CSR) is a business approach that contributes to sustainable development by delivering economic, social and environmental benefits for all stakeholders. CSR is a concept with many definitions and practices.
CSR aims to ensure that companies conduct their business in a way that is ethical. This means taking account of social, economic and environmental impact and consideration of human rights.

CHARITABLE SUPPORT

HERE at CYBER 123 we work with various charitable organisations to provide computers for disadvantaged children and families. We also provide community support centres IT and Security systems. We also provide support, advice and awareness training for many people.

AWARENESS

By providing awareness training and curriculum support for schools we aim to cut the cyber and physical scams off at the roots making sure that people are not only aware of the types of scams that are currently in practice but also to train people on what to look out for to spot and stop potential new scams and cyber fraud.

PRIVACY POLICY

The Crime and Fraud we help prevent can occur in a cyber form but also written letter, telephone or in person (face to face). When we say “you” or “Member” or “Subscriber” we’re referring to the person or entity that’s registered with us to use the Services. We may combine information about you or your Subscribers with information provided by other Members or third parties to create ”Aggregate Information,” which may include, but isn’t limited to, names, email addresses, demographic information, IP addresses and location.

CHANGES

If there are any material changes to this Privacy Policy, we’ll post them on the Website and send them to the last email address you gave us. Any changes will be effective as of the date we post them on the Website or send the email (whichever date is later). You may object to any changes within 20 days after they’re posted on our Website or delivered to you, in which case none of the proposed changes will be effective with respect to information that we’ve already collected from you, but will apply only to information we collect in the future. We won’t treat information of any open account differently from any other open account. If you object to changes in our Privacy Policy, we’ll have to terminate your account.

SCOPE

This Privacy Policy is effective with respect to any data that we’ve collected, or collect, about and/or from you, according to our Terms of Use.

QUESTIONS & CONCERNS

If you have any questions or comments, or if you want to update, delete, or change any Personal Information we hold, or you have a concern about the way in which we have handled any privacy matter please use our contact form to get in touch. You may also contact us by or email at:

privacy@Cyber123.com and mark it to the attention of the Privacy Officer.

  1. Information You Provide to Us: When you use the Services, consult with our customer service team, send us an email, post on our blog, or communicate with us in any way, you’re giving us information that we collect. That information may include your and your Subscribers’ IP address, name, physical address, email address, phone number, credit card information, operating system, as well as details like gender, occupation, location, birth date, purchase history, and other demographic information. By giving us this information, you consent to your information being collected, used, as described in our Terms of Use and Privacy Policy. We will never sell lists or email addresses or any other information we collect to third parties.
  2. Name and Email Information: When you add your name and email address we will use this information to send you emails with information that you have requested or subscribed to. We conform to unsubscribe and RFC5321 which describes email compliance.
  3. Information from your Use of the Service: We may get information about how and when you use the Services, store it in log files associated with your account, and link it to other information we collect about you. This information may include, for example, your IP address, time, date, browser used, and actions you’ve taken within the application.

  4. Cookies and Tracking:
    When you use Cyber123, we may store “cookies,” “tags,” or “scripts,” which are strings of code, on your computer. We and our analytics Service Providers (like Google) use those cookies to collect information about your visit and your use of our Website or Services. You may turn off cookies that have been placed on your computer by following the instructions on your browser, but if you block cookies, it may be more difficult (and maybe even impossible) to use some aspects of the Services.
  5. Web Tracking: When we send emails to Members, we may track behaviour such as who opened the emails and who clicked the links. We do that to measure the performance of our email campaigns and to improve our features for specific segments of Members. To do this, we include unique identifiers within the emails we send. Web Tracking allows us to collect information about when you open the email, your IP address, your browser or email client type, and other similar details. We may also include Web Tracking in the emails we deliver for you. We use the data from Web Tracking to create the reports about how our email campaign performed and what actions you, a member or the subscriber took. Reports are also available to us when we send standard email to you, so we may collect and review that information.
  6. Information from Other Sources: We may get more information about you or your Subscribers, like name, age, and use of social media websites, by searching the internet or querying third parties (we’ll refer to that information as Supplemental Information). We use Supplemental Information to develop features like Social Profiles, to assist with Ethical Hacking or Social Engineering. We will only use other sources if you request one of these services.
  7. Information from the use of our Mobile Apps: When you use our mobile apps, we may collect information about the type of device and operating system you use. We may ask you if you want to receive push notifications about activity in your account. If you opt in to these notifications and no longer want to receive them, you may turn them off through your operating system. We don’t access or track any location-based information from your mobile device unless you’ve given us permission. We may use mobile analytics software to help us better understand how people use our application. We may collect information about how often you use the application and other performance data. We don’t collect or link that data with any personally identifiable information.
  8. Use and Disclosure of Your Personal Information

We may use and disclose your Personal Information only as follows:

  1. To promote use of our Services. For example, if you leave your Personal Information when you visit our Website and don’t sign up for any of the Services, we may send you an email asking if you want to sign up. And if you use any of our Services and we think you might benefit from using another Service we offer, we may send you an email about it. You can stop receiving our promotional emails by following the unsubscribe instructions included in every email we send.
  2. To send you informational and promotional content that you may choose (or “opt in”) to receive. You can stop receiving our promotional emails by following the unsubscribe instructions included in every email.
  3. To bill and collect money owed to us. This includes sending you emails, invoices, receipts, notices of delinquency, and alerting you if we need a different credit card number. We use third parties for secure credit card transaction processing, and we send billing information to those third parties to process your orders and credit card payments. To learn more about the steps we take to safeguard that data, see Section 12 below.
  4. To send you System Alert Messages. For example, we may let you know about temporary or permanent changes to our Services, like planned outages, new features, version updates, releases, abuse warnings, and changes to our Privacy Policy.
  5. To communicate with you about your account and provide customer support.
  6. To enforce compliance with our Terms of Use and applicable law. This may include developing tools and algorithms that help us prevent violations.
  7. To protect the rights and safety of our Members and third parties, as well as our own.
  8. To meet legal requirements like complying with court orders, valid discovery requests, valid subpoenas, and other appropriate legal mechanisms.
  9. To provide information to representatives and advisers, like attorneys and accountants, to help us comply with legal, accounting, or security requirements.
  10. To prosecute and defend a court, arbitration, or similar legal proceeding.
  11. To provide, support, and improve the Services we offer. This includes aggregating information from your use of the Services.
  12. To provide suggestions to you. This includes adding features and services that we believe become relevant to you and technology evolves.
  13. To transfer your information in the case of a sale, merger, consolidation, liquidation, reorganisation, or acquisition. In that event, any acquirer will be subject to our obligations under this Privacy Policy, including your rights to access and choice. We’ll notify you of the change either by sending you an email or posting a notice on our Website.
ACCESSIBILITY POLICY
We work very hard to make CYBER 123 as accessible as possible straight out of the box. We’ve tried to develop CYBER 123 to be as accessible as possible for each individual user.

 

We are continually seeking out solutions that will bring all areas of the site up to the same level of overall web accessibility. In the meantime should you experience any difficulty in accessing the CYBER 123 website, please don’t hesitate to contact us.

WHAT ARE WE DOING?

To help us make the CYBER 123 website a positive place for everyone, we’ve been using the Web Content Accessibility Guidelines (WCAG) 2.0. These guidelines explain how to make web content more accessible for people with disabilities, and user friendly for everyone.

The guidelines have three levels of accessibility (A, AA and AAA). We’ve chosen Level A as the target for the CYBER 123 website.

HOW ARE WE DOING?

We’re working hard to achieve our goal of Level A accessibility, but we realise there are some areas that still need improving.

Whilst we at CYBER 123 strive to adhere to the accepted guidelines and standards for accessibility and usability, it is not always possible to do so in all areas of the website.

TERMS & CONDITIONS

This legal information is not the same as legal advice, especially where law diverges in your specific circumstances so we insist that you consult a legal expert if you’d like advice on your interpretation of this information or its accuracy. You may not rely on this paper as legal advice, nor as a recommendation of any particular legal understanding.

The Crime and Fraud we help prevent can occur in a cyber form but also written letter, telephone or in person (face to face). When we say “you” or “Member” or “Subscriber” we’re referring to the person or entity that’s registered with us to use the Services. We may combine information about you or your Subscribers with information provided by other Members or third parties to create ”Aggregate Information,” which may include, but isn’t limited to, names, email addresses, demographic information, IP addresses and location.

While providing the Services, we may collect Personal Information, which means information about a Member or Subscriber.

INFORMATION WE COLLECT

Information You Provide to Us: When you use the Services, consult with our customer service team, send us an email, post on our blog, or communicate with us in any way, you’re giving us information that we collect. That information may include your and your Subscribers’ IP address, name, physical address, email address, phone number, credit card information, operating system, as well as details like gender, occupation, location, birth date, purchase history, and other demographic information.

By giving us this information, you consent to your information being collected, used, as described in our Terms of Use and Privacy Policy. We will never sell lists or email addresses or any other information we collect to third parties.

We may get information about how and when you use the Services, store it in log files associated with your account, and link it to other information we collect about you. This information may include, for example, your IP address, time, date, browser used, and actions you’ve taken within the application.

Cookies and Tracking: When you use Cyber123, we may store “cookies,” “tags,” or “scripts,” which are strings of code, on your computer. We and our analytics Service Providers (like Google) use those cookies to collect information about your visit and your use of our Website or Services. You may turn off cookies that have been placed on your computer by following the instructions on your browser, but if you block cookies, it may be more difficult (and maybe even impossible) to use some aspects of the Services.

Web Tracking: When we send emails to Members, we may track behaviour such as who opened the emails and who clicked the links. We do that to measure the performance of our email campaigns and to improve our features for specific segments of Members. To do this, we include unique identifiers within the emails we send.

PUBLIC INFORMATION

We have public blogs on our Websites. Any information you include in a comment on our blog may be read, collected, and used by anyone. If your Personal Information appears on our blogs and you want it removed, contact us. If we’re unable to remove your information, we’ll let you know why.

Details of how to contact us can be found on the bottom of the home page section of our website.
Social Media Platforms and Widgets. Our Websites include social media features, like the Facebook Like button. These features may collect information about your IP address and which page you’re visiting on our site, and they may set a cookie to make sure the feature functions properly. Social media features and widgets are either hosted by a third party or hosted directly on our site.

We also maintain presences on social media platforms like Facebook, Twitter, and LinkedIn. Any information, communications, or materials you submit to us via a social media platform is done at your own risk without any expectation of privacy. We cannot control the actions of other users of these platforms or the actions of the platforms themselves. Your interactions with those features and platforms are governed by the privacy policies of the companies that provide them.

Links to Third-Party Sites. Our Websites include links to other websites, whose privacy practices may be different from Cyber123’s. If you submit Personal Information to any of those sites, your information is governed by their privacy policies. We encourage you to read carefully the privacy policy of any Website you visit.

Service Providers. If it’s necessary to provide you something you’ve requested, like send you a printed material for distribution to students or enable a feature like Social Profiles, then we may share your personal information to a Service Provider for that purpose. We’ll tell you we’re working with a Service Provider whenever reasonably possible, and you may request at any time the name of our Service Providers.

SPECIALISTS IN CYBER SECURITY

Here at CYBER123 we believe that prevention and training is the best way to secure your digital world. If we can train you on what things to spot, how scams and cybercrime works then we believe you are less likely to become a victim. Our unique training offers scenarios and advice on what to spot how to protect yourself and how to deal with the scams and frauds that are about in the world today.

Understanding the resources that support critical functions and the related cyber security risks enable businesses to define resources and efforts in mitigating the risks

CALL US:  +44 (0)20 3457 4683 EMAIL US: info@cyber123.com

IT ONLY TOOK 5 MINUTES TO GET YOUR DATA

If I have your work email address, generally, now I will have your first name and surname and the company you work for.

WHAT TO DO IF YOUR INSTAGRAM ACCOUNT HAS BEEN HACKED

Firstly, if your Instagram account has been hacked then there is a good chance your email has been hacked as well. What you would need to do first would be to report it to Instagram.

TELEPHONE SPOOFING

Telephone spoofing is easy to do, all you have to do is create an account on a website, enter a few telephone numbers and you get to call someone as if you were someone else.

Is your child being Cyber Bullied

Parents can find it difficult to tell the difference between the emotional development of their children or whether something more sinister is taking place.
A lot of the times it is normal for growing children to have mood swings, quiet periods, manic periods and changes of emotional circumstance but sometimes these can also be a sign that they are being bullied or bullying others.

From Xero to Zero

To test and check the security of Xero online accounting software I wanted to see if they were susceptible to MITM attacks. I created a trial account and signed up and logged into Xero using standard 1FA (1 Factor Authentication –ie, password). I installed the Xero APP on my phone and Logged in being able to Skip MFA (Multiple Factor Authentication).

Three Mobile Data Breach

According to news reports some 6 million customer records have been stolen from Three Mobile (one of the UK’s largest mobile network providers). In order to commit this type of upgrade fraud the attackers must have used authorised login credentials to access the upgrades systems. Data accessed would have included names, phone numbers, addresses and date of births of customers.

Three reasons to worry about worms

Worms are a type of malware similar to viruses in that it is self-replicating. However, worms don’t generally attach themselves to applications. Why should you worry about worms?

The Day the Internet Died

Twitter, Spotify, Reddit, PSN and a whole load of other internet services and websites were down or left partially working on Friday. This happened when hackers launched an extremely large Distributed Denial of Service (DDoS) attack on Dyn DNS Servers. Dyn is a major host of internet DNS servers. It looks like Dyn was hit with up to 4 attacks lasting most of Friday.

3 reasons to worry about spyware

Obviously spyware is not something that you would like to have on your computer, tablet or mobile phone but should you be worried about spyware? Some of the stories I have heard are just scary!

Are you infecting your customers?

Earlier in the year mobile provide O2 had marketing campaign where they were promoting an e-book. To distribute their e-book they sent out free USB memory sticks to their customers. Unfortunately for them the e-book wasn’t the only thing on the USB sticks and unwitting customers that plugged the USB sticks into a windows devices found themselves infect with a virus.

SIGN UP TO OUR NEWS LETTER

Footer Contact

3 + 14 =

Share This