Cyber attack is your data secure?

13.09.2021

How confident are we in the security of our own data? We are not just talking about what you have on your PC, but also your mobile phone, websites, social media accounts and more. 

I think it's so scary, at the same time it's something we must live with. In short, you may want to think about security in their systems. For example, imagine that everything is suddenly locked. How does it affect your everyday life?

I will not go in depth but move a little on the surface in relation to how important this is for everyone. Small businesses are often more vulnerable to this than one likes to admit.

What is a cyber attack in general?

Cyberattacks are unwanted attempts to steal, reveal, alter, disable or destroy information through unauthorized access to computer systems.

One may ask oneself why.

Some of it is of course financially motivated, but that is only a small part. Here are also:

  • Former employees who have an agenda
  • Hacker competitions
  • Industrial espionage and espionage to gain an unfair advantage over competitors and challenges.
  • Information that is offensive to the person it is aimed at
  • Blocking you from your system and data.

Type of cyberattack one often hears about.

To shed some light on what we are talking about, it is good to look at the facts about the common ones that one should beware of. You may want to think about safety.

Backdoor Trojan

A backdoor Trojan creates a backdoor vulnerability in the victim's system, allowing the attacker to gain remote, and almost total, control. Frequently used to link up a group of victims' computers into a botnet or zombie network, attackers can use the Trojan for other cybercrimes.

Cross-site scripting attack

XSS attacks insert malicious code into a legitimate website or application script to get a user's information, often using third-party web resources. Attackers frequently use JavaScript for XSS attacks, but Microsoft VCScript, ActiveX and Adobe Flash can be used, too.

Denial-of-service

DoS and Distributed denial-of-service (DDoS) attacks flood a system's resources, overwhelming them and preventing responses to service requests, which reduces the system's ability to perform. Often, this attack is a setup for another attack.

DNS tunnelling

Cybercriminals use DNS tunnelling, a transactional protocol, to exchange application data, like extract data silently or establish a communication channel with an unknown server, such as a command and control exchange.

Malware

Malware is malicious software that can render infected systems inoperable. Most malware variants destroy data by deleting or wiping files critical to the operating system's ability to run.

Phishing

Phishing scams attempt to steal users' credentials or sensitive data like credit card numbers. In this case, scammers send users emails or text messages designed to look as though they're coming from a legitimate source, using fake hyperlinks.

Ransomware

Ransomware is sophisticated malware that takes advantage of system weaknesses, using strong encryption to hold data or system functionality hostage. Cybercriminals use ransomware to demand payment in exchange for releasing the system. A recent development with ransomware is the add-on of extortion tactics.

Conclusions:

One now wonders how can cyberattacks be reduced.

We believe that engaging those you have contact with and who have some knowledge about the topic is often the best.

Many of us have often included some security in what we help to deliver.

But

If you think like the bigger companies, you can reduce cyberattacks with an effective cyber security system. Cyber security is a practice of protecting critical systems and sensitive information from digital attacks, involving technology, people, and processes.

An effective cyber security system prevents, detects, and reports cyberattacks using key cyber security technologies and best practices. Here is something that should be included:

Identity and access management

A comprehensive data security platform

Safety information and incident management

Offensive and defensive security services and threat intelligence

Read more useful articles at: https://www.visualityglobal.com/article/ 

Source includes IBM.