What is a Cyber Attack?
A Cyber-Attack is any kind of action that targets a Computer Information System and damages or steals the victims data. The data acquired is modified, damaged, sold or even held at ransom from the victim. The hacker does this through various types of Cyber-Attacks.
Below lists some of the more Common Cyber-Attacks[/vc_column_text][vc_single_image image=\”638\” img_size=\”large\”][vc_column_text]
A software designed specifically with the intent to harm a computer system and gain unauthorized access to a system with high privilege. There are several types of Malware.[/vc_column_text][vc_row_inner][vc_column_inner width=\”1/2\”][vc_column_text]1. Spyware is a software which, if installed in to your Mobile or PC unintentionally, will allow a third party to access your monitor or steal your personal data.
Spyware is notorious for capturing screenshots, keystrokes and grabbing personal information such as authentication credentials and credit card details.
2. Ransomware, like the name indicates, is a malware that will deny you access to your own system,which can only be reclaimed once you pay a ransom. There are 2 ways in which your device can be a affected. One is called Malspam [Malicious Spam], disguised as an innocent email, this is a spam email that would include a link that redirects you to a malicious website. The second type is Malvertising. Ransomware appears as a malicious web page and contains an infected iframe or invisible element to capture your data.
There are 3 types of ransomware, each of them only removable by paying a ransom.
*Scareware: Causes ads to pop up in your window.
*Screen locker: Will deny you access to your PC through the lock screen.
*Encrypting: Encrypts your personal files. The Decrypt Key will be provided once the Ransom has been payed.[/vc_column_text][/vc_column_inner][vc_column_inner width=\”1/2\”][vc_column_text]3.Viruses: Computer viruses are malicious software that when executed, replicates itself and spread the malicious content code. The virus can infect the vulnerable system, gain admin control, and steal user sensitive data. If the User runs the infected file, the virus will get activated, causing your system to slow down, pop ups to take over your screen, duplicate files, delete files and creating new files etc…
4. Worms: Worms are similar to viruses but does not wait for the user to activate it unintentionally, nor does it need to attach itself to a software to cause damage to a system. Once inserted into the system, the worm replicates itself. Worms can be transferred to the system through infected storage media, such as, USBs, CDs, and Floppy Disks. Worms can also transfer itself from one computer to another by going through an individual’s email address book.
5. Trojan Horses: Trojan Horses come off as a legitimate software but contains malicious codes. Trojan Horses can get through the computers security and take over the device.
Here are the types of Trojan Horses that can affect your device.
* Backdoor Trojan:Creates a backdoor entrance for an attacker to gain access to your computer.
* DDOS Attack Trojan: Performs a DDOS attack on your device.
* Downloader Trojan: Downloads and installs Malicious programs on your pc.
* Info stealer Trojan: Collects personal data from your device
6. Adware: Malicious software that presents itself as an unwanted advertisement in a user’s computer. These advertisements may appear as pop up box or an un-closable window.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text]
Phishing attacks happen through email. These emails could contain malicious attachments or malicious links which when clicked on, steal sensitive data like credit card detail/logging information or might install malicious software.
This attack interrupts a transaction between clients and the server, steal the data, and modify if wanted.
Denial-of -service attack
Here, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses. The main purpose of a DoS attack is not to steal information but to slow or take down a web site.
In a SQL Injection attack, the attacker uses a code injection query to steal your database information. The query is used to inject malicious code to the web page input and steals sensitive data such as logging information and can also modify data.
This attack happens when network vulnerability is exposed. The attacker targets the disclosed vulnerability before the system is patched and the solution is implemented.
How to protect your organization from cyber attack
Cyber attacks, even simple ones can be detrimental to your business. Loosing important and sensitive data is only one way you can be affected. Organizations need to keep in mind that data breaches can be quite costly, dragging down the bottom line. Loss of customers, loss of reputation and trust and possibly even the licence to conduct business are only some of the negative impacts of cyber attacks.
Keep your organization and your employees safe from such attacks. Here are a simple yet effective ways to protect your organization;
Backup and encrypt the data
Use strong password. Do not use default password
Conduct audits and awareness programs regularly from security experts
Insure the company against this cyber attack
Conducts risk assessment
Use recommended antivirus
Install Intrusion detection
Use updated Operating Systems
Use proper Access restricted policies[/vc_column_text][/vc_column][/vc_row]