The internet is a dangerous place for unsecured businesses. Companies large and small are targets for cyber-criminals.
Here are the top 8 internet threats to businesses:
Malware is a general term used to describe malicious code. Viruses, trojans, worms, adware, and ransom-ware are a few example. This is code designed to harm your computer, spread to other computers, steal information, or gain control of your computer.
Phishing attacks come in the form of emails from attackers posing as a trusted 3rd party. An attacker may send an email that appears to come from your bank and ask you to login to verify a recent transaction. In fact, the attacker will steal your login information and may use it for malicious purposes.
3. Password Attacks
Password attacks come in many forms but are generally attacks that aim to guess or retrieve passwords from users. Attackers may “brute force” passwords by simply using a computer script to guess billions of passwords every second. Some attacks are focused on researching an individual and trying to guess passwords by using details important to that individual. For example, knowing your pet’s name or your mother’s maiden name may clue an attacker to your password.
4. Denial-of-Service (DoS)
DoS attacks are caused by sending massive amounts of fake requests to a website causing the website to crash from too much traffic. For companies whose website is crucial to business, DoS attacks can be especially harmful. It is very easy for even a single individual with moderate computer knowledge to execute one of these attacks.
5. “Man in the Middle”
Man in the Middle attacks are caused by attackers who are able to intercept your data over the internet. Attackers make your computer think that it is connecting to the website it asked for when actually, it forwards information to the attacker’s computer before reaching the appropriate destination. An attacker in a Man in the Middle Attack can view all unencrypted data that is sent and received from whomever your computer is connecting to. This may be a bank, email server.
6. Drive-By Downloads
These are bits of code that can be given to your computer just by visiting a website or opening an email. This bit of code can automatically download and install malware on your computer without your permission.
Some internet ads are designed to install malware or ask for user information. These ads typically are advertising a fake product or service but may seem legitimate.
8. Rogue Software
Rogue software is malware that pretends to be an important security update or even a system program. They can impersonate popular software like Adobe and Windows and ask you to download their latest release or update your operating system.
Contact us to help protect your network infrastructure from these threats.