Protecting your world from online risks
Our lives are increasingly connected – we’re here to help protect what’s important to you, whether it’s on or offline.
Our world, our lives, and our homes are increasingly connected. This connectivity has opened the door for previously unimagined opportunities, but with this opportunity comes previously unimagined security risks that affect every one of us.
Cyber safety has become one of the fastest-growing security issues we face in the modern world. Where we were once ‘simply’ concerned with physical threats (burglary, flooding, storm damage, etc.), now we have to consider how the technology we use every day can be used against us.
It's far from just the concern of big business; we are all targets. With that in mind, there are things we can all do to keep ourselves a lot safer online – ensuring the convenience of having connected devices isn’t overshadowed by cyber threats.
This guide is created with security experts Blackstone Consultancy and designed to highlight just a few common cybersecurity issues and solutions to help you manage your online safety with the same scrutiny you’d manage your personal safety.
If you do experience a cyber-attack, your Ecclesiastical Art & Private Client insurance policy includes home systems damage, cybercrime, and cyber online liability as standard.
Phishing
Phishing is the practice of sending a high number of emails, disguised as though they are from reputable companies. The idea is to trick individuals into revealing personal information, such as passwords and credit card numbers.
More than 3 billion phishing emails are sent every day!
Sending millions of emails in a single campaign costs very little money. Even if one recipient out of 10,000 makes one purchase, the spammer can turn a profit.
Example
A hacker downloads thousands of leaked email addresses from the web.
More than 3 billion phishing emails are sent every day ... one of them goes to Harriet.
Harriet receives an email from ‘PayPal’, which she happens to use when making online purchases.
The email offers a discount if Harriet logs into her ‘PayPal’ account within the next 24 hours. The link redirects Harriet to a fraudulent site.
The fraudulent PayPal site scans Harriet’s computer and downloads keylogger software that can record every keystroke made.
With banking and online shopping passwords known to the hacker, he builds up a profile of Harriet’s online identity.
The PayPal account shows Harriet’s bank details, which are used to pay for a number of online purchases.
Harriet’s bank account is slowly drained so it isn’t noticed.
The hacker is also able to see the details of all of Harriet’s friends and family in her contacts... they are also targeted.
How to manage the risk
Spearphishing
Phishing attacks have grown far more sophisticated and targeted; even a personal email from a source you trust isn’t necessarily what you think it is.
Spearphishing is the practice of sending emails that are allegedly from a known or trusted sender. The aim is to encourage targeted individuals to reveal confidential information.
The email address will be ‘spoofed’ to look like a legitimate address from a known sender. Knowing what to look out for in a spoof email can help you identify them and respond appropriately.
Example
A hacker is able to research email addresses and personal information from social media groups for school parents.
A well-crafted email is sent to Simon, one of the parents in the group.
The email address has been ‘spoofed’ to look like the address used by the school’s fee payment department.
The email offers a fee discount for early payment, and a link is included.
The hacker has created a website that looks very similar to the school’s.
The discount was too good to ignore, so Simon transfers the money.
The real payment request comes from the school a week later!
Simon realises that he might have been the victim of a scam.
Simon immediately calls his bank, but as he voluntarily sent the money, there's little they can do.
Simon has now lost the term’s fees for his children and has to find the extra money.
How to manage the risk
Online data sharing
Over-sharing online, through media and even government data sources like Company’s House, can mean you are giving away personal information to hackers. By gathering this information and building a profile on you and your family, hackers can make you a target.
Younger generations can be a big risk to families if they overshare on social media. Avoiding the sharing of documents, letters, licences and other sensitive information might seem obvious but even sharing daily activities, holiday pictures and hobbies can give too much information to the wrong people.
Example
Jeremy, a local businessman, and his family's home are featured in a national magazine article.
A hacker saw the article. With some research, he learned Jeremy was married with three children, and their social media accounts had limited privacy settings.
He focused on the son’s social media posts and was able to find university information and other facts.
The son's Instagram told the hacker that the family went skiing at the same place every winter.
This information allowed him to know when the house would be empty.
Posts about sports day told him which school the children attend. He was able to confirm patterns and wealth levels.
Posts about horse riding lessons and other leisure activities showed when the house was empty during the week.
Using open source data, the hacker was able to find photographs and the floor plan of the family home.
In a matter of minutes, he also has external imagery of the property, and he can see all security features present.
He wants to visit in person... so he pretends to be a delivery driver, as the homeowner will open the door every time to one.
After checking the response times of the local police, he picks a time when Jeremy and his family are away and breaks in.
How to manage the risk
Home network attacks
All connected devices in the home access the internet through a common point, the router. There is an assumption that they are always secure but in reality, this is not always the case.
Many of the popular routers have vulnerabilities. For example, if a hacker can log onto your Wi-Fi network, they can access all Wi-Fi run devices in the home, including smart devices, fire and security systems and monitor your web traffic. And they can do this anytime, 24/7.
Example
John and his family live in a nice home on a leafy road in the Home Counties.
John’s broadband router is clearly visible in a window.
The hacker, needs to get a closer look...
He waits for an empty driveway and approaches the house under the guise of a food delivery driver.
With the router type and password, he can easily join it.
Many of the popular routers have vulnerabilities and he is able to access all Wi-Fi-run devices in the home and monitor their web traffic.
When John checks his online bank account he sees that his money has been transferred to an unknown source!
How to manage the risk
Man-in-the-middle attack
A man-in-the-middle attack is when data shared from a computer to a server is intercepted.
Shared Wi-Fi networks are handy but not always completely secure. Not every Wi-Fi network you access is ‘genuine’, hackers sometimes create fake Wi-Fi networks. Once you are logged on, they can watch your every move.
Example
James, a local homeowner, enjoys the ‘café culture’ in his village and likes to visit the busy local coffee shop regularly.
It’s Saturday morning, and James walks to his local coffee shop to use the free Wi-Fi to complete a few tasks he couldn’t quite get to during his busy week.
James buys a coffee and sits down, and gets his laptop out.
A hacker has created a fake Wi-Fi network with a very legitimate-sounding name...
James’s identity and credentials have been stolen and he’s lost money and will face certain distress and inconvenience.
James logs on to the fake Wi-Fi network.
The hacker can now monitor James’s online activity as he’s placed himself in the middle of the connection, so he is able to intercept login details, bank card information, and more.
How to manage the risk
Dissatisfied staff
We usually know and trust the people that come into our homes but in some instances, people may have sinister motives.
Keep an eye on domestic staff, construction workers and other people that visit your home who you may not know well enough to trust fully. If you find them to be disinterested in their work, there could be more to the situation.
Example
Harry moves into his new property.
As Harry’s new home is much larger than his previous property, he needs more domestic staff.
Harry speaks to his friends, and they recommend a new housekeeper who is available.
As Harry is a shrewd businessman, he haggles over the desired salary and hours. The housekeeper eventually accepts and commences work at the house.
After 6 months, the new housekeeper becomes disinterested in working for Harry and is very unhappy with her current salary and working hours.
A simple recording device bought online for only £10 is hidden in Harry’s study by the housekeeper who is now able to listen in remotely on all conversations in the room.
After months of recordings, the housekeeper has insight into Harry’s business deals including a large contract that Harry’s business is pitching for.
The housekeeper sells the information about the large contract to one of Harry’s competitors for a large sum of money.
Harry’s rivals use the information to undercut the contract and they are successful in winning the business.
How to manage the risk
![]()
In collaboration with

About Blackstone Consultancy
Blackstone Consultancy is a security and investigative advice consultancy and is one of our preferred suppliers.
Canada
Ireland