Threats

Unfortunately there are now many different ways that cyber criminals can interfere with everyday running of businesses. They can use a variety of different malware* to do this, they include:

  • Viruses – a small piece of code that can replicate itself and spreads between computers by attaching itself to a file.
  • Ransomware – this type of malware requests a payment after the launch of an attack on a computer system.
  • Spyware/Adware – this can be installed on your computer when you open a link or an attachment and when you download infected software.
  • Worms – these are self-replicating and don’t need a program to attach themselves to. They are constantly looking for vulnerabilities within the computer system and then report back when weaknesses are found.
  • Trojans – this is a type of virus that appears to be performing one function but actually performs malicious activity when executed.

Cyber criminals can also use attack vectors, which allow them to infect computer systems with malware or harvest stolen data, such as:

  • Phishing – an attempt to gather a users private information by posing as a legitimate company/entity. (an example of social engineering.)
  • Drive-by – these are attacks put in against specific weaknesses with a system.
  • Social Engineering – this is the exploitation of an individuals’ weakness. This could be by clicking on infected links, or physically getting access to a persons’ computer through deception.
  • Pharming – this is an attack to redirect a website’s traffic to a fake website, which is where the individuals information is then compromised. (an example of social engineering.)
  • Man in the Middle (MITM) – this is an attack where a middleman impersonates each endpoint and is then able to manipulate both victims.

*a type of software that is designed to allow criminals to achieve their objectives.

Feel free to talk to one of CyberGuys on - our team of experts are experienced in their field, however we keep the jargon to a minimum, friendly, helpful and happy to answer any questions you may have.

Network Security

Network Security is an activity designed to protect the integrity and usability or a network and data. This includes both hardware and software technologies. This type of security is targeted towards many different threats and can stop them entering or spreading through your network.

Web Server Vulnerabilities

Web server security is an important aspect for any business to protect their web server connected to the internet. It should have a well layered defence and is especially important for businesses with customer-facing websites.

One in four businesses reported a cyber breach
or attack in the past 12 months

Take action now! With Cyber Essentials Plus certification

TOP