Cops Versus Robbers? The Beginner’s Guide to NOT Getting Cyber Attacked

Being “cyber attacked” means someone targets your devices, accounts or data to steal, disrupt or extort. The good news: common sense and a few simple steps — like patching, strong passwords, MFA and backups — stop most attackers.

Why should you treat cyber security like a neighbourhood watch?

Remember how we lock doors, set alarms and teach kids not to talk to strangers? The same basic rules apply online. In the physical world we have obvious barriers (walls, gates, locks). Online, we build those barriers with software settings, routines and awareness. People are often the weakest part of the chain — so awareness is your best first defence.

Common tricks the “robbers” use

  • Phishing: convincing emails or messages that look legit, asking you to click a link or enter details.
  • Malware and ransomware: malicious software that installs itself and steals or locks your files.
  • Weak or stolen passwords: reused or simple passwords let criminals open multiple accounts.
  • Unsecure Wi‑Fi and public hotspots: attackers can snoop on traffic if the network isn’t protected.
  • Social engineering: attackers manipulate people (often over the phone or messaging) to reveal information.

Quick checklist — how not to get cyber attacked

Treat this like a home‑security checklist. Do these first:

  • Patch and update: keep your phone, computer and router firmware up to date — updates often fix security holes.
  • Use strong, unique passwords: one per account. Better: use a password manager to generate and store them.
  • Turn on multi‑factor authentication (MFA): a second step (code or app) stops many account takeovers.
  • Install reputable anti‑malware and keep it current: antivirus plus real‑time protection reduces risk.
  • Secure your Wi‑Fi: use WPA2/WPA3 encryption and a strong admin password on your router.
  • Back up your data regularly: offline or cloud backups let you recover if ransomware hits.
  • Think before you click: check senders, hover to preview links, never enter credentials on odd pages.
  • Limit admin privileges: don’t run daily tasks as an administrator account.
  • Be careful with attachments and downloads: only open files from people you trust.
  • Protect children: use parental controls and teach them not to share personal info.

Simple, everyday analogies that help

  • Passwords = keys: don’t use the same key for every door.
  • MFA = a deadbolt + key: if someone gets the key, they still need the deadbolt.
  • Updates = fixing broken locks: delaying updates is like leaving the back door open.

If you suspect you’ve been cyber attacked — take immediate action

  1. Disconnect affected device(s) from the network (Wi‑Fi/mobile data) to limit spread.
  2. Change important passwords from a different, clean device — start with email and banking.
  3. Turn on MFA where possible and check account recovery options.
  4. Restore from backups if files are encrypted, and seek expert help for ransomware.
  5. Notify your bank and relevant services if financial details were exposed.
  6. Get professional help if needed — a managed service or security specialist can contain and investigate.

Keep it proportionate — tips for families and small businesses

You don’t need an army of tools. Focus on the basics — updates, MFA, backups and awareness — and build from there. For businesses wanting to step up, consider managed detection or firewall services, but start with the essentials first.

Play the game smarter than the robbers

Teaching simple habits — like not clicking suspicious links and using MFA — makes you a much harder target. Cyber security doesn’t need to be scary; make it part of daily routine and you’ll reduce the odds of getting cyber attacked significantly.

Frequently Asked Questions

What does it mean to be “cyber attacked”?
It’s when a person or group uses digital tools to steal, damage or block access to your devices, accounts or data — for example phishing, malware or account takeover.

What’s the quickest way to reduce my risk of being cyber attacked?
Turn on multi‑factor authentication, use unique strong passwords (with a password manager), keep software updated and back up your data.

Can antivirus stop all cyber attacks?
No. Antivirus helps a lot, but it’s not a complete shield. Combine it with updates, MFA, secure Wi‑Fi and cautious behaviour for best protection.

I clicked a phishing link — what should I do?
Disconnect from the internet, change passwords (from a different device), enable MFA, scan for malware, and contact your bank or service providers if you entered any financial details.

Are kids at risk of being cyber attacked?
Yes — kids can be targeted by social engineering or exposed to unsafe content. Use parental controls, teach safe habits and monitor what they install or share.

‘Stranger Danger’ From Just One Click

We teach children to look both ways before crossing the road — we should teach employees the same caution online. Phishing and malicious attachments are the “stranger danger” of the Internet: an email that looks legit can be the single click that opens a door to ransomware, data loss and costly downtime. Organisations can reduce risk dramatically by equipping people with simple, repeatable habits and the right protections.

Phishing is a fraudulent email or message designed to trick people into clicking links or opening attachments that install malware or steal credentials. One careless click can allow attackers to deploy ransomware or access sensitive company data.

Don’t click: how phishing works

Cyber criminals impersonate trusted organisations or colleagues, craft urgent requests, or hide malicious links in seemingly normal documents. The attack chain is often short: a convincing message → one click or opened attachment → malware executes → attackers escalate access or encrypt files. That single step is why “stranger danger online” is so effective.

Ransomware attacks unleash havoc

When malware runs on one device it can move laterally across a network, encrypting files and disrupting operations. Recovery can be lengthy and expensive; backups, endpoint protection and incident response plans reduce harm, but stopping the initial click is the most cost‑efficient defence.

Look both ways: how to spot phishing — 5 quick checks

  • Check the sender address (does it match the organisation, not just the display name?).
  • Hover over links to view the real URL before clicking.
  • Don’t open unexpected attachments — confirm with the sender first.
  • Watch for urgent language, threats or inconsistent tone and spelling.
  • Verify payment or credential requests with a separate call to the sender.

How to help employees become cyber‑smart

  1. Train: regular, bite‑sized awareness sessions that explain phishing examples and reporting steps.
  2. Test: run simulated phishing campaigns and give immediate feedback to anyone who clicks.
  3. Enforce: use technical controls (MFA, endpoint protection) and clear reporting routes so staff act quickly.

Joint responsibilities — people, process, products

Security is everyone’s job. Employees need awareness and reporting channels; managers must model safe behaviour and enforce policies; IT should deploy prevention tools and run simulated exercises. Combine behaviour change with product protections like phishing simulations and endpoint defences to lower organisational risk.

A quick tip on reporting and response

If you suspect an email is phishing: don’t click the link, screenshot the message, forward it to your IT security team (or quarantine it), and change exposed passwords if you believe credentials were entered. Rapid reporting shortens the mean time to detect and contain costly threats.

Learn more about our cybersecurity solutions and protective services.

Frequently Asked Questions

  1. What is a phishing email?
    A phishing email impersonates a trusted sender to trick recipients into revealing credentials or opening malware‑bearing attachments.
  2. How can one click cause a ransomware attack?
    A malicious attachment or link can install malware that encrypts files and spreads across a network, forcing an organisation to restore from backups or pay a ransom.
  3. How do I spot a phishing email?
    Check the sender address, hover links to see the real URL, avoid unexpected attachments, watch for urgency or greedy requests, and verify with the sender if unsure.
  4. What should employees do if they suspect phishing?
    Do not click; report the message to your security or IT team, quarantine the email if possible, and change any potentially exposed passwords.
  5. Are simulated phishing campaigns effective?
    Yes — regular simulations with immediate, contextual training reduce click rates and reinforce safer online behaviour.
  6. What is multi‑factor authentication (MFA) and why use it?
    MFA requires an extra verification step (e.g. SMS or authenticator app) beyond a password and greatly reduces the chance of account takeover.
  7. How often should employees receive cyber awareness training?
    At minimum quarterly refreshers plus just‑in‑time micro‑learning after simulations; frequent reinforcement keeps awareness high.

Closing the Door on Cyber Intruders Breaking into Your Home Network

Cyber intruders don’t need to be tech geniuses to cause havoc — they look for easy targets: weak Wi‑Fi, default passwords and unsecured smart devices. Here’s a practical, no‑fuss guide to locking down your home network so your family, devices and data stay safe.

Start with the router — the front door to your network

  • Change the default admin logins straight away. If your router still uses the factory username and password, you’re inviting cyber intruders in.
  • Use a strong, unique password for both your router login and Wi‑Fi network (passphrases of 16+ characters are ideal).
  • Enable the strongest Wi‑Fi encryption available (WPA3 if supported; otherwise WPA2 with AES).
  • Turn off WPS (Wi‑Fi Protected Setup). It’s convenient, but also an easy way for cyber intruders to break in.

Keep firmware and devices up to date

  • Update router firmware regularly. Manufacturers release patches that fix security holes cyber intruders can exploit.
  • Apply updates to all connected devices — phones, laptops, smart TVs, cameras and other IoT devices.
  • If a device no longer receives updates, consider replacing it. Unpatched hardware is an open invitation to cyber intruders. We offer affordable rental options on Wi-Fi Mesh units to make this process as easy as possible for you.

Segment your network

  • Create a guest network for visitors and a separate network for IoT devices (smart lights, thermostats, cameras).
  • Segmentation limits what an attacker can reach if they compromise one device — it keeps your work laptop and personal files safer.

Lock down smart devices

  • Change default usernames and passwords on every smart device.
  • Wherever possible, disable features you don’t use (remote access, UPnP).
  • Review device privacy settings and remove unnecessary integrations.

Use multi‑factor authentication and strong passwords

  • Enable multi‑factor authentication (MFA) on accounts that support it — email, cloud storage, and smart device accounts.
  • Use a password manager to create and store unique passwords for every account. Reusing passwords makes it easier for cyber intruders to move across services.

Add extra layers: VPNs, firewalls and monitoring

  • Use a reputable VPN when on public Wi‑Fi and consider a VPN for your home network if you need privacy from third‑party snooping.
  • Activate your router’s firewall and enable basic intrusion detection if available.
  • Consider a simple network monitoring app or the router’s built‑in tools to spot unfamiliar devices. Early detection reduces the damage cyber intruders can do.

Back up and prepare for incidents

  • Keep regular backups of important files (offline or encrypted cloud backups).
  • If you suspect a breach, disconnect the affected device, change passwords and, if needed, reset the router to factory settings and reconfigure securely.
  • Keep a list of device default credentials, firmware versions and support contacts for quick reference.

Family habits that make a difference

  • Teach household members not to click suspicious links or open unknown attachments — phishing is a common route for cyber intruders.
  • Limit admin access to the router and devices to one or two trusted people.
  • Regularly review which devices are connected and remove anything unfamiliar.

Quick checklist — secure your home against cyber intruders

  • Change default router logins and Wi‑Fi SSID/password
  • Use WPA3 or WPA2 (AES) encryption
  • Disable WPS and remote admin if unused
  • Create guest and IoT networks for segmentation
  • Keep router and device firmware up to date
  • Use MFA and unique passwords (use a password manager)
  • Enable router firewall and basic monitoring
  • Regular backups and a response plan

Securing your home network doesn’t have to be complicated. Start with the router, lock down smart devices, and teach the family safe online habits — these simple steps make life harder for cyber intruders and keep your home safer.

Frequently Asked Questions

  1. What is a cyber intruder?
    A cyber intruder is anyone or any software that gains unauthorised access to your devices or network to steal data, spy or cause damage.
  2. How can I tell if my home network has been breached?
    Signs include unusually slow internet, unknown devices showing as connected, unexpected pop‑ups, or unusual account activity. If you see these, investigate and change passwords.
  3. Is my smart TV a security risk?
    Yes — any Internet‑connected device can be a risk if it runs outdated software or uses default credentials. Update your smart TV and change default passwords.
  4. How often should I update my router firmware?
    Check for firmware updates monthly and install them as soon as they’re available. Critical patches should be applied immediately.
  5. Do I need a VPN at home?
    A VPN adds privacy and can protect data in specific scenarios, but it’s not a substitute for basic network security like strong Wi‑Fi encryption and updated devices.

The reality of cyber risk – A Groot Ontbyt Interview

We are living in a digital and connected world more than ever before – whether its working from home, doing online shopping, gaming, online learning or watching movies – the list goes on. But the reality is that we are also a lot more vulnerable from a security point of view and opening ourselves up to cyber breaches.

Listen to Vox Account Manager and expert, Ian Meyer, as he talks about cyber security and gives tips on how to avoid cyber attacks.

How NOT to get Hacked: A Survival Word to the ‘not so wise’.

We’d like to think we’ve come a long way from the days of chain mails, ‘forward this to ten people or suffer from bad luck for eternity’, and Nigerian Prince scams. Circa 2007, it seemed like you could barely open Hotmail (yes, we’re that old) without encountering some transparent (yet surprisingly effective) means of tricking early internet users into parting with their hard-earned money.

Like we said earlier, we like to think society has progressed since then (or at least become substantially less gullible). However, as anyone who has an elderly aunt in a family WhatsApp group can testify, the rise of social media and online communicative platforms has, sadly, done precious little to deter the spread of incorrect and, more often than not, harmful content (as well as created a plethora of “Good Morning, Have A Blessed Day” motivational memes – seriously, who is making those and sending them to our elders???).

The truth is, for every tech-savvy,’ Mr. Robot in training’ privy to the latest pseudo FNB text message asking you to click and verify, there’s a gullible old grand aunt in search of the next great weight loss miracle pill (or, let’s be honest, a middle-aged uncle trying to add one inch to his… hair). And, in the world of Cyber Security, nothing is more dangerous than unknowing internet users clicking things guaranteed to land them in trouble. Identity theft, malware, phishing scams and the like are more prevalent than ever (we are, after all the third most targeted country in the world for Cyber Crimes – what a time to be the best at something!).

A little education goes a long way, which is why we’ve put together this nifty survival guide to ensure your browsing time isn’t someone else’s payday…

  1. Bill Gates (or anyone, for that matter) is NOT going to send you money.

A quick Google search for the world’s richest man should bring up articles about Mr. Gates believing he’s the Coronavirus Messiah – but none, strangely, of him promising to send $1000 to everyone who forwards his test mailer. If you haven’t interacted with Microsoft, it’s highly unlikely they’ll contact you out of the blue (and if you are a customer, it’s even less likely that good ol’ Bill has decided to feel generous). As such, any Email or communication which promises you gold, diamonds and all the treasures in the land if you click a link, pass on a message, or download a file is 99.99% guaranteed to be a scam – so be wise and economise, because no small fortune ever came via a Gmail link.

  1. Do not click that link in your DM’s

Some common messages which have led to hacked Social Media Accounts begin with “I made this for you” and “this looks just like you”. We can safely say that nobody, especially your high-school rugby captain who you haven’t spoken to since 2012, has not made anything for you – nor will a link lead you to your doppelganger. Be wary of social media DM’s, especially those coming out the blue. More importantly, be careful of any message, be it via a social network or SMS, which directs you to click, follow or download something – often a simple button is all it takes.

  1. Nobody is going to help you earn $2000 a day working from home.

Sure, it’s technically possible, but only through many years of hard work, expertise, and knowledge. If getting rich were as easy as trusting an internet pop up, great aunt Gertrude would be a millionaire and this author wouldn’t be writing this piece at 10pm on a Friday (sorry, boss). These ads and offers (which usually make some outlandish promise that seems too good to be true) usually are, and can be found either in the comments, stories or web pop ups designed to catch desperate users off guard.

  1. That Bitcoin expert in the comments with 1000 testimonials is probably a bot.

These ones get us right in the feels, because sometimes said scammers go so far as to directly WhatsApp innocent, unsuspecting parties privately. You often don’t know where they got your details from or how they’re contacting you, but between their promises of unforetold riches and ‘guaranteed profit’, a gullible party can quickly become a victim. Our favourite pastime is to pretend we work for Interpol until they block our number, but this isn’t for everyone, so be wary of any unknown number even saying ‘hello’ to you, and don’t be fooled into thinking that 1am private message with 16 typos is a representative of a legitimate entity.

  1. The Government does not send out official Data (especially around Covid-19) via WhatsApp

In truth, we naturally distrust anything governmental. If they say it’s Level 3 loadshedding, we immediately assume we’re on Level 5 (which we normally get to anyway). But this one is specifically for those of you in the family chat who insist on passing on “official” Government memos – don’t do it. Official communications come from the predetermined channels (or a very slow speaking President talking in circles for thirty minutes) – but they most certainly don’t come from your local community watch group.

Sadly, we live in a society where it’s easier to get scammed than it is to get electricity. But, like we said earlier, a little education goes a long, long way. These are just the basics of navigating the digital world without being sucked in to a long, dark rabbit hole, but for a more comprehensive range of Cyber Security solutions, check out Armata.co.za. Oh, and lastly, this blog post is one link we don’t mind you circulating – in fact, we encourage it, so let’s get Aunty Gertrude back for a change 😛