BLOG

The Cyber-Attacks Threatening Your Business

The Cyber-Attacks Threatening Your Business

As we embrace the digital revolution, along with the countless benefits, it’s important to remain vigilante in securing your business against the threats. To many, the cyber-universe is confusing, geeky and surreal. However, the threats of cyber-security are very real. Any ignorance of their capabilities can be catastrophic for your business.

Here’s a simplified list of the most common cyber-attacks and how they could affect your business.

Cyber-Attacks hacker in hood

Malware

Short for ‘malicious software’, malware gets into your computer system and creates havoc. They come in many forms:

Virus and Worms

Much like a living virus, a software virus can multiply itself and spread across multiple computers. Once an infected program has been launched, the virus can break down the computer and steal information.

Spyware

Spyware watch and record your actions. Once affected, spyware can record your keystrokes (everything you type) and even harvest your data.

Trojan Horse

A trojan disguises itself as a normal/ trusted file or download. It’s another way for a malware to access a computer and steal data, change files and monitor behaviour.

Phishing Attacks

You may have seen phishing attacks in your spam mail. Not all of them end up there. Calculated ‘spear phishing’ use social engineering to trick you with personal emails and information. Often, the source will be a fake website or email that imitates trusted ones and once visited will overload your system with malware.

DDOS Attacks

Distributed Denial of Service is a cyber attack that overloads a server, making it too full to run. An analogy would be adding golf balls into a bathtub, at first, they would roll around, continue adding them and they would get stuck and unable to move. By overloading a website, it will shut down.

Man in the middle (MITM) Attacks

A MitM attack is where the communication on a server is hijacked. Session Hijacking is when a user has their IP address (a string of numbers unique to every computer using a network) replaced by the attacker’s IP address. If the attack is successful, the server will believe it is still communicating with the user.

Password Attacks

Passwords are the almost universally recognised form of ID online. Therefore, it’s no surprise they are under heavy fire. Password attacks come in two main forms: Brute-Force Attacks, here the password is guessed using obvious combinations, for example ‘stewart1984’. And secondly, Dictionary Attacks, here a script will input combinations of common words. It’s also possible for attackers to scan your keystrokes, memorising everything you have typed in that day. These attacks, known as ‘Key Logger Attacks’ come from malware.

Conclusion:

If this article has achieved anything, you will know the variety and creativity of potential attacks, and the importance of investing in security solutions. Click here to book a free roadmap workshop in security.

Timico

We deliver Connectivity, UC&C, Cloud & Hosting, Security and IT Managed Service Solutions to our customers, through Service Operations based in Newark, Winnersh, Telford and London.

Sep 18, 2018

More great content you might be interested in

How Teams Voice helped me to kickstart my new job

With just 3 months in the Timico team, but more than a decade of enterprise communications experience, UC&C Product Manager, Tommy Dowd explains how Microsoft Teams Voice was not only instrumental during his enrollment into the team, but also opened his eyes to new possibilities, and new levels of freedom. How Teams Can Bring Freedom…
Read More

The challenges posed by accelerated Digital Transformation

Things you never heard a CEO say 1 year ago: “How will the new “Rule of 6” affect how our staff use our office space?” “Have we got enough face masks and antibacterial gel?” “I’ve just been in the cafeteria and no one was social distancing!” “Have we figured out the one-way system in the…
Read More

Celebrating our Timigos during National Coding Week

To celebrate National Coding Week (14 September to 20 September), we spoke to some of our expert developers to shed light on why they enjoy working in coding at Timico. National Coding Week is an annual event, which aims to help build confidence and nurture skills, in order to close the skills gap within the…
Read More

Book a free consultation for your business today

Find out where there is space for change in your business, and how you are performing against your competitors.

Book a free consultation