Back
Cyber Security Training & Software for Companies | MetaCompliance

Products

Discover our suite of personalised Security Awareness Training solutions, designed to empower and educate your team against modern cyber threats. From policy management to phishing simulations, our platform equips your workforce with the knowledge and skills needed to safeguard your organisation.

Cyber Security eLearning

Cyber Security eLearning to Explore our Award-Winning eLearning Library, Tailored for Every Department

Security Awareness Automation

Schedule Your Annual Awareness Campaign In A Few Clicks

Phishing Simulation

Stop Phishing Attacks In Their Tracks With Award-Winning Phishing Software

Policy Management

Centralise Your Policies In One Place And Effortlessly Manage Policy Lifecycles

Privacy Management

Control, Monitor, and Manage Compliance with Ease

Incident Management

Take Control Of Internal Incidents And Remediate What Matters

Back
Industry

Industries

Explore the versatility of our solutions across diverse industries. From the dynamic tech sector to healthcare, delve into how our solutions are making waves across multiple sectors. 


Financial Services

Creating A First Line Of Defence For Financial Service Organisations

Governments

A Go-To Security Awareness Solution For Governments

Enterprises

A Security Awareness Training Solution For Large Enterprises

Remote Workers

Embed A Culture Of Security Awareness - Even At Home

Education Sector

Engaging Security Awareness Training For The Education Sector

Healthcare Workers

See Our Tailored Security Awareness For Healthcare Workers

Tech Industry

Transforming Security Awareness Training In The Tech Industry

NIS2 Compliance

Support Your Nis2 Compliance Requirements With Cyber Security Awareness Initiatives

Back
Resources

Resources

From posters and policies to ultimate guides and case studies, our free awareness assets can be used to help improve cyber security awareness within your organisation.

Cyber Security Awareness For Dummies

An Indispensable Resource For Creating A Culture Of Cyber Awareness

Dummies Guide To Cyber Security Elearning

The Ultimate Guide To Implementing Effective Cyber Security Elearning

Ultimate Guide To Phishing

Educate Employees About How To Detect And Prevent Phishing Attacks

Free Awareness Posters

Download These Complimentary Posters To Enhance Employee Vigilance

Anti Phishing Policy

Create A Security-Conscious Culture And Promote Awareness Of Cyber Security Threats

Case Studies

Hear How We’re Helping Our Customers Drive Positive Behaviour In Their Organisations

A-Z Cyber Security Terminology

A Glossary Of Must-Know Cyber Security Terms

Cyber Security Behavioural Maturity Model

Audit Your Awareness Training And Benchmark Your Organisation Against Best Practice

Free Stuff

Download Our Free Awareness Assets To Improve Cyber Security Awareness In Your Organisation

Back
MetaCompliance | Cyber Security Training & Software for Employees

About

With 18+ years of experience in the Cyber Security and Compliance market, MetaCompliance provides an innovative solution for staff information security awareness and incident management automation. The MetaCompliance platform was created to meet customer needs for a single, comprehensive solution to manage the people risks surrounding Cyber Security, Data Protection and Compliance.

Why Choose Us

Learn Why Metacompliance Is The Trusted Partner For Security Awareness Training

Leadership Team

Meet the MetaCompliance Leadership Team

Careers

Join Us and Make Cybersecurity Personal

Employee Engagement Specialists

We Make It Easier To Engage Employees And Create a Culture of Cyber Awareness

MetaBlog

Stay informed about cyber awareness training topics and mitigate risk in your organisation.

Internet of Things (IoT): Securing Your New Gizmos This Christmas

Internet of Things security issues

about the author

Share this post

The holiday season is well and truly upon us, by now you’ve more than likely got your Christmas shopping wrapped up, literally and figuratively, and dreaming about what you yourself will be unwrapping on Christmas day. Many of us will have bought, or will be hoping to unwrap, a smart connected device this festive season, especially those us tech junkies.

As IoT devices continue to pervade our day to day lives we look at some of the IoT Christmas gifts that will feature on many a Wishlist this year and asking the question ‘are they really secure?’

Smart Speakers

Smart Speakers

Smart speakers are continuing to grow in popularity, with the likes of Amazon already having stamped their authority on the market. Alongside Amazon, Google is dominating the rest of the market with its ‘Home’ system. It comes equipped with WiFi, high definition speakers and a sound sensitive mic. Home automation, entertainment and a world of interaction come with Google Home as it works to control your entire household. 

As good as these smart devices are, they do carry a risk. For example, commonly used music streaming services such as Spotify can be used through these speakers, which may leave devices vulnerable and at risk of their security being compromised. This has been seen in particular with the Bluetooth issues collectively known as BlueBorne which witnessed an attacker hack into a smart speaker.

Thankfully these issues have since been patched but more problems are certain to arise in the future. This is why proper configuration of all your devices is important, especially in regard to IoT devices that have the ability to communicate throughout your home.

Is your Coffee Maker Spying on You?

Is your Coffee Maker Spying on You?

Yes, yes, it is. Or it could be, hackers can access smart coffee makers to gather information on you.

For some of us we don’t feel awake until we’ve had our morning dose of caffeine and the experience of your morning cup of coffee has gotten even better thanks to IoT. With a smart coffee machine, you can set it so that it sends your phone an alarm or notification to wake you up after it has finished brewing. These machines come with WiFi, Bluetooth and features such as customisable notification systems so you can have coffee ready and waiting when you get up or go home.

So, what’s the catch? You’d be surprised about the extent to which any IoT device can be hacked. Whilst you may be enjoying the convenience of your morning cuppa, this smart little machine could be hacked and held to ransom, used to gather your personal information, conduct espionage or used in a botnet to attack global businesses. For example, the Mirai botnet attack saw 100,000 IoT devices infected across 164 countries, the botnet was used to attack major brands such as Netflix, Twitter and Etsy.

Have your IoT Cake and Eat It Too

Have your IoT Cake and Eat It Too

It’s understandable to be concerned about these IoT stories, and you should be. However, it’s possible to enjoy the features and benefits of IoT whilst being secure, you just need to take precautions with your devices. Follow our tips to get the best of IoT without compromising your security.

1) Only connect to what is necessary: Your smart fridge will be able to order groceries online as you run out. What it does not need access to is your databases and network file shares- ripe pickings for a potential hacker. Reduce the risk your IoT devices pose by only connecting them to the relevant places.

2) Password security: Unsurprisingly, a great deal of IoT security breaches have arisen via the same means as many other Internet security breaches – insecure passwords. Lots of IoT devices will come with a default password and attackers will find these online easily. If you don’t change the password that comes along with your device then you are inviting an attack from a hacker.

3) Update often: Regardless of the type of IoT device, the software behind it will eventually contain a flaw that needs to be fixed. The vendor will then update the software to rectify this, however you will need to make sure your device auto-updates are switched on so that it is able to update itself when it needs to and remain secure.

4) Disable redundant features: Many vendors will have all features turned on and ready to go as soon as the device is out of the box. However, with each feature you could be providing a different window through which a hacker can attack. We advise that you disable as many features as possible that will not affect what you want to get out of the item in question. Review what you need and disable any extras you don’t.

Have you bought an IoT device and has a security problem? Do you often change the passwords for your devices? Which items are you looking forward to this Christmas period?

Other Articles on Cyber Security Awareness Training You Might Find Interesting