Eleet Cybersecurity Solutions

Practical Cyber Security Solutions for Tradies and Small Business Owners

We Are Eleet Cyber Security Solutions

Safe Keeping

Email and data disruptions can cause a major inconvenience to your business. Get protected with the right security and back-up schedules.

KISS Advocates

Keeping it simple is a specialty of ours. No buzz-words and confusing terms. Just understanding what you do, and making sure you are protected.

Train & Explain

Get involved as much or as little as you like so you understand the process, the structure and the outcomes. We also provide staff training.

Cyber Security Has Come a Long Way. Have You?

From the 1940s to the present

In the 1940s although computers existed they were so large they took up 3story buildings and no one knew how to operate them so cybercrime was of no use. (The first debugging of a computer was when they removed a moth that had flown into the circuitry). 

In the late 1950s, ‘phone phreaking’ emerged. The term captures several methods that ‘phreaks’ – people with a particular interest in the workings of phones used to hijack the protocols that allowed telecoms engineers to work on the network remotely to make free local and long-distance calls. The dye was cast for digital technology.

In the 1960s, most computers were huge mainframes, and even programmers had limited access. Students were invited by IBM in 1967 to try out their new system. They probed deeper into the system’s language. A number of students worked out how to bomb the system, which resulted in the development of offensive measures. This is what is known as ethical hacking, and this is still practiced today.

In the 1970’s cybersecurity began. This was when viruses started and an antivirus programme was written. With this most networks were connected using telephones, showing that there were many entry points that needed protecting.

Until the 1980’s with the advent of the world wide web cyber crime was at a minimum. In 1987 the first commercial antivirus programme was written.

In the 1990’s the movement towards emails, was fast and furious, this dramatically changed the way people corresponded. This then opened more entry points for viruses and malware to enter the systems. Because of emails snail mail has began its demise.

In the 2000’s we saw the emergence of cloud computing. Layers of protection had to be developed with the increase of smart phones and mobile devices. People realised that with this technology they could work from home or the coffee shop or anywhere they desired. This then produced more points of entry for hackers, (eg a mobile phone has 7 points of entry).

In the 2010’s with the need to have connectiveness with everybody this offered up new avenues for cyber criminals to exploit. Specialised programmes tailored to meet the requirements of home and business users began to bloom.

As cybersecurity developed to tackle the expanding range of attack types, criminals responded with their own innovations: multi-vector attacks and social engineering. This caused antivirus programmes to go from signature based to next generation detection techniques.

This has now brought us down to 2020. Because of increased hacking, phishing emails, malware, spyware, this has lead to multi-factor authentication, this can entail password, with a code or a dongle . Even these can be worked around to get access to your data and personal information.

These are some of the tricks cybercriminals are using to hack your systems and demand money. Just remember that Microsoft and big corporations and banks do not cold call or send emails requesting your details to access your account.

Just because you have all your information on the cloud doesn’t mean you are safe. Safeguards need to be put in place on all your devices, and training for yourself and staff if you have them.

This is a new frontier often referred to as a modern wild west.

Have you had a phone call recently saying you have not paid your tax bill, phone bill, electricity, etc? And its working!!! That’s why these more people are jumping on the hacker bandwagon.

But things will change at an ever increasing rate.

Who knows what the next decade will bring?

Cyber Security Has Come a Long Way. Have You?

In the 1940s although computers existed they were so large they took up 3story buildings and no one knew how to operate them so cybercrime was of no use. (The first debugging of a computer was when they removed a moth that had flown into the circuitry).

In the late 1950s, ‘phone phreaking’ emerged. The term captures several methods that ‘phreaks’ – people with a particular interest in the workings of phones used to hijack the protocols that allowed telecoms engineers to work on the network remotely to make free local and long-distance calls. The dye was cast for digital technology.

In the 1960s, most computers were huge mainframes, and even programmers had limited access. Students were invited by IBM in 1967 to try out their new system. They probed deeper into the system’s language. A number of students worked out how to bomb the system, which resulted in the development of offensive measures. This is what is known as ethical hacking, and this is still practiced today.

In the 1970’s cybersecurity began. This was when viruses started and an antivirus programme was written. With this most networks were connected using telephones, showing that there were many entry points that needed protecting.

Until the 1980’s with the advent of the world wide web cyber crime was at a minimum. In 1987 the first commercial antivirus programme was written.

In the 1990’s the movement towards emails, was fast and furious, this dramatically changed the way people corresponded. This then opened more entry points for viruses and malware to enter the systems. Because of emails snail mail has began its demise.

In the 2000’s we saw the emergence of cloud computing. Layers of protection had to be developed with the increase of smart phones and mobile devices. People realised that with this technology they could work from home or the coffee shop or anywhere they desired. This then produced more points of entry for hackers, (eg a mobile phone has 7 points of entry).

In the 2010’s with the need to have connectiveness with everybody this offered up new avenues for cyber criminals to exploit. Specialised programmes tailored to meet the requirements of home and business users began to bloom.

As cybersecurity developed to tackle the expanding range of attack types, criminals responded with their own innovations: multi-vector attacks and social engineering. This caused antivirus programmes to go from signature based to next generation detection techniques.

This has now brought us down to 2020. Because of increased hacking, phishing emails, malware, spyware, this has lead to multi-factor authentication, this can entail password, with a code or a dongle . Even these can be worked around to get access to your data and personal information.

These are some of the tricks cybercriminals are using to hack your systems and demand money. Just remember that Microsoft and big corporations and banks do not cold call or send emails requesting your details to access your account.

Just because you have all your information on the cloud doesn’t mean you are safe. Safeguards need to be put in place on all your devices, and training for yourself and staff if you have them.

This is a new frontier often referred to as a modern wild west.

Have you had a phone call recently saying you have not paid your tax bill, phone bill, electricity, etc? And its working!!! That’s why these more people are jumping on the hacker bandwagon.

But things will change at an ever increasing rate.

Who knows what the next decade will bring?