• Connectivity
        • Connectivity solutions ranging from basic broadband connections, through to fully managed, innovative SD-WAN solutions providing an always-on, dynamic connection that will automatically select the best path for your network traffic.

        • Unified Comms
        • With a pedigree in fixed and mobile communications, cloud voice, and cloud-based Productivity tools, Timico’s unified and converged services enables your end-users to work and collaborate more effectively, where when and how they need.

        • Cloud & Hosting
        • Our leading edge cloud and data centre services range from simple Hosting and Data Protection right through to complex hybrid cloud deployments and Public Cloud solutions utilising Microsoft Azure, enabling you to focus on what you do best.

        • IT Managed Services
        • We deliver IT managed services so you can focus your resources on creating client value. Our capability extends from the end-user device right through to the Public Cloud, offering a single point of contact for all IT services and support.

        • Security
        • No matter what level of protection your business needs, we've got 1st class security management and applications at the ready - our job is to keep your business safe from unwanted threats and attacks.

        • Retail
        • Helping retailers increase lifetime value and enhance customer experience by supporting an omnichannel strategy.

        • Leisure & Hospitality
        • Helping leisure & hospitality brands and operators to increase brand loyalty and enhance guest experience digitalisation.

        • Professional Services
        • Helping professional services firms to create client value and capture long term advantage, by enabling their digitalisation and increasing return on talent.

        • Not For Profit
        • Enabling Not for Profit organisations to increase their impact by embracing technology to create additional value, drive digital transformation and efficiencies.

        • Don't see your industry here?

          We work with many business sectors, so if you would like to find out where there is space for change in your business, book a free roadmap consultation with one of our experts today.

          Book in today
        • Strategic Partnerships
        • We have excellent relationships with a series of strategic partners that enable us to provide you with a comprehensive range of business-enabling solutions.

        • Our Commitments
        • We have grown rapidly over the past 14 years, and so has our commitment to implement and improve support for our colleagues, customers and our local community.

        • Compliance and Security
        • Security and compliance are important factors of managed services, that are absolutely essential to the security and integrity of your business.

  • Blog
  • Support
  • Log-in

BLOG

The Cyber-Attacks Threatening Your Business

The Cyber-Attacks Threatening Your Business

As we embrace the digital revolution, along with the countless benefits, it’s important to remain vigilante in securing your business against the threats. To many, the cyber-universe is confusing, geeky and surreal. However, the threats of cyber-security are very real. Any ignorance of their capabilities can be catastrophic for your business.

Here’s a simplified list of the most common cyber-attacks and how they could affect your business.

Cyber-Attacks hacker in hood

Malware

Short for ‘malicious software’, malware gets into your computer system and creates havoc. They come in many forms:

Virus and Worms

Much like a living virus, a software virus can multiply itself and spread across multiple computers. Once an infected program has been launched, the virus can break down the computer and steal information.

Spyware

Spyware watch and record your actions. Once affected, spyware can record your keystrokes (everything you type) and even harvest your data.

Trojan Horse

A trojan disguises itself as a normal/ trusted file or download. It’s another way for a malware to access a computer and steal data, change files and monitor behaviour.

Phishing Attacks

You may have seen phishing attacks in your spam mail. Not all of them end up there. Calculated ‘spear phishing’ use social engineering to trick you with personal emails and information. Often, the source will be a fake website or email that imitates trusted ones and once visited will overload your system with malware.

DDOS Attacks

Distributed Denial of Service is a cyber attack that overloads a server, making it too full to run. An analogy would be adding golf balls into a bathtub, at first, they would roll around, continue adding them and they would get stuck and unable to move. By overloading a website, it will shut down.

Man in the middle (MITM) Attacks

A MitM attack is where the communication on a server is hijacked. Session Hijacking is when a user has their IP address (a string of numbers unique to every computer using a network) replaced by the attacker’s IP address. If the attack is successful, the server will believe it is still communicating with the user.

Password Attacks

Passwords are the almost universally recognised form of ID online. Therefore, it’s no surprise they are under heavy fire. Password attacks come in two main forms: Brute-Force Attacks, here the password is guessed using obvious combinations, for example ‘stewart1984’. And secondly, Dictionary Attacks, here a script will input combinations of common words. It’s also possible for attackers to scan your keystrokes, memorising everything you have typed in that day. These attacks, known as ‘Key Logger Attacks’ come from malware.

Conclusion:

If this article has achieved anything, you will know the variety and creativity of potential attacks, and the importance of investing in security solutions. Click here to book a free roadmap workshop in security.

Timico

Timico is a managed service provider that delivers world-class connectivity, workplace and cloud technology to over ten thousand customers.

Sep 18, 2018

More great content you might be interested in

The evolution of technology procurement from suppliers to partners

I’m really looking forward to being part of the panel discussion at RetailEXPO 2019: “How is technology procurement evolving and what are retailers looking for from supplier partnerships?” Recently, I’ve really seen a difference in the relationships that are being built between technology providers and retailers, because technology can now become a sales enabler, as…
Read More

A Guide to Digital Transformation for Hospitality

Driving digital transformation in the hospitality industry Digital transformation has made it to hospitality, and it is just in time. Guest expectations have changed; they demand digital communication and personalised experiences. More people travel than ever before, and a burgeoning middle class in places like China, India and South Korea is putting pressure on established…
Read More

Not All Clouds are Equal – Private vs Public Cloud for Voice

The days of having a desk phone are slowly dying. As the world embraces digital transformation, IP Voice is at the forefront when it comes to critical applications. Voice has always been a minefield, and while Cloud adoption is generally beneficial, it’s not a one size fits all solution. Inaccurate or ill-fitted solutions can result…
Read More

Book a FREE consultation

Find out where there is space for change in your business, and how you are performing against your competitors.