BLOG

The Cyber-Attacks Threatening Your Business

The Cyber-Attacks Threatening Your Business

As we embrace the digital revolution, along with the countless benefits, it’s important to remain vigilante in securing your business against the threats. To many, the cyber-universe is confusing, geeky and surreal. However, the threats of cyber-security are very real. Any ignorance of their capabilities can be catastrophic for your business.

Here’s a simplified list of the most common cyber-attacks and how they could affect your business.

Cyber-Attacks hacker in hood

Malware

Short for ‘malicious software’, malware gets into your computer system and creates havoc. They come in many forms:

Virus and Worms

Much like a living virus, a software virus can multiply itself and spread across multiple computers. Once an infected program has been launched, the virus can break down the computer and steal information.

Spyware

Spyware watch and record your actions. Once affected, spyware can record your keystrokes (everything you type) and even harvest your data.

Trojan Horse

A trojan disguises itself as a normal/ trusted file or download. It’s another way for a malware to access a computer and steal data, change files and monitor behaviour.

Phishing Attacks

You may have seen phishing attacks in your spam mail. Not all of them end up there. Calculated ‘spear phishing’ use social engineering to trick you with personal emails and information. Often, the source will be a fake website or email that imitates trusted ones and once visited will overload your system with malware.

DDOS Attacks

Distributed Denial of Service is a cyber attack that overloads a server, making it too full to run. An analogy would be adding golf balls into a bathtub, at first, they would roll around, continue adding them and they would get stuck and unable to move. By overloading a website, it will shut down.

Man in the middle (MITM) Attacks

A MitM attack is where the communication on a server is hijacked. Session Hijacking is when a user has their IP address (a string of numbers unique to every computer using a network) replaced by the attacker’s IP address. If the attack is successful, the server will believe it is still communicating with the user.

Password Attacks

Passwords are the almost universally recognised form of ID online. Therefore, it’s no surprise they are under heavy fire. Password attacks come in two main forms: Brute-Force Attacks, here the password is guessed using obvious combinations, for example ‘stewart1984’. And secondly, Dictionary Attacks, here a script will input combinations of common words. It’s also possible for attackers to scan your keystrokes, memorising everything you have typed in that day. These attacks, known as ‘Key Logger Attacks’ come from malware.

Conclusion:

If this article has achieved anything, you will know the variety and creativity of potential attacks, and the importance of investing in security solutions. Click here to book a free roadmap workshop in security.

Timico

We deliver Connectivity, UC&C, Cloud & Hosting, Security and IT Managed Service Solutions to our customers, through Service Operations based in Newark, Winnersh, Telford and London.

Sep 18, 2018

More great content you might be interested in

Telecommuting

Telecommuting – How Timico Enables Remote Working and Digital Transformation

Telecommuting, otherwise known as remote working, was a luxury that few businesses offered before 2020. Even before the pandemic, remote working was often limited to a select few individuals. The benefits to the employee included greater work and life balance, reduced expenses, in addition to more intangible factors, such as improved trust perception. While businesses…
Read More

Top tips: Taking the Not for Profit industry beyond Covid-19

The Covid-19 pandemic has pushed the Third Sector to the limit. From adopting remote working solutions to embracing different fundraising models; the sector has had to adjust to a new normal, and fast. The Not for Profit industry is one of the biggest sectors to have been impacted by the pandemic in the UK, with…
Read More

Timico accepted into the Government (G-Cloud) framework

We are pleased to confirm our official appointment to the £600m UK Government Cloud (G-Cloud) 12 Framework. With our significant expertise in delivering world-class managed and professional service cloud solutions for the public sector, the framework is forecasted to provide Timico with access to opportunities worth more than £596m. What is the G-Cloud 12 Framework?…
Read More

Book a free consultation for your business today

Find out where there is space for change in your business, and how you are performing against your competitors.

Book a free consultation