BLOG

The Cyber-Attacks Threatening Your Business

The Cyber-Attacks Threatening Your Business

As we embrace the digital revolution, along with the countless benefits, it’s important to remain vigilante in securing your business against the threats. To many, the cyber-universe is confusing, geeky and surreal. However, the threats of cyber-security are very real. Any ignorance of their capabilities can be catastrophic for your business.

Here’s a simplified list of the most common cyber-attacks and how they could affect your business.

Cyber-Attacks hacker in hood

Malware

Short for ‘malicious software’, malware gets into your computer system and creates havoc. They come in many forms:

Virus and Worms

Much like a living virus, a software virus can multiply itself and spread across multiple computers. Once an infected program has been launched, the virus can break down the computer and steal information.

Spyware

Spyware watch and record your actions. Once affected, spyware can record your keystrokes (everything you type) and even harvest your data.

Trojan Horse

A trojan disguises itself as a normal/ trusted file or download. It’s another way for a malware to access a computer and steal data, change files and monitor behaviour.

Phishing Attacks

You may have seen phishing attacks in your spam mail. Not all of them end up there. Calculated ‘spear phishing’ use social engineering to trick you with personal emails and information. Often, the source will be a fake website or email that imitates trusted ones and once visited will overload your system with malware.

DDOS Attacks

Distributed Denial of Service is a cyber attack that overloads a server, making it too full to run. An analogy would be adding golf balls into a bathtub, at first, they would roll around, continue adding them and they would get stuck and unable to move. By overloading a website, it will shut down.

Man in the middle (MITM) Attacks

A MitM attack is where the communication on a server is hijacked. Session Hijacking is when a user has their IP address (a string of numbers unique to every computer using a network) replaced by the attacker’s IP address. If the attack is successful, the server will believe it is still communicating with the user.

Password Attacks

Passwords are the almost universally recognised form of ID online. Therefore, it’s no surprise they are under heavy fire. Password attacks come in two main forms: Brute-Force Attacks, here the password is guessed using obvious combinations, for example ‘stewart1984’. And secondly, Dictionary Attacks, here a script will input combinations of common words. It’s also possible for attackers to scan your keystrokes, memorising everything you have typed in that day. These attacks, known as ‘Key Logger Attacks’ come from malware.

Conclusion:

If this article has achieved anything, you will know the variety and creativity of potential attacks, and the importance of investing in security solutions. Click here to book a free roadmap workshop in security.

Timico

We deliver Connectivity, UC&C, Cloud & Hosting, Security and IT Managed Service Solutions to our customers, through Service Operations based in Newark, Winnersh, Telford and London.

Sep 18, 2018

More great content you might be interested in

Mental Health Awareness Week: Going further to support our colleagues

This year for Mental Health Awareness Week, we furthered our commitment to supporting our people’s health and wellbeing, by hosting several activities and events. Mental Health Awareness Event is an annual week-long event, which took place from 10 to 16 May this year. The week, which is recognised by leading charities, encourages people to open…
Read More

Five technologies for effective remote working

A staggering 7.5 million UK workers want to work from home permanently once lockdown restrictions lift in June, a report has found. At Timico, we’re not surprised. The report by Deloitte highlighted that the number of workers wanting to work from home has more than doubled in the last year and there has been a…
Read More

Utilise your social housing IT partner

In any housing association, the technological requirements are vast. That is why the benefits of utilising a social housing IT partner is plentiful. Technology partnerships exist to help social housing organisations implement and optimise their technical systems. But budget and time restraints can often mean that the value of an IT partner is overlooked by…
Read More

Book a free consultation for your business today

Find out where there is space for change in your business, and how you are performing against your competitors.

Book a free consultation