The recent ransomware cyber attack brought to light the damage that can be done by hackers targeting vulnerable IT systems. While the NHS has received a lot of attention in the press, this attack in fact impacted organisations and individuals around the world.
A 2017 survey by the British Chambers of Commerce revealed that 20% of UK businesses have fallen victim to a cyber-attack in the past year.
While larger companies and well-known brands are the most likely to be targeted, small businesses are also under threat. 18% of small companies (with fewer than 99 employees) also found themselves hacked in the past 12 months.
Before taking the necessary precautionary steps to protect your website, your data and your business, it is worth investing some time to educate yourself as to the types of attacks that you could be exposed to.
Some of the most common cyber attacks include:
DDoS attacks –
Distributed denial of service attacks prevent real customers from using your website or service, by flooding you with traffic from multiple different sources.
Malicious Software, or Malware, includes a number of different types, all of which are intended to disrupt normal computer operations. Specific examples include:
- Adware – Displays unwanted adverts to users, with users often being inundated with pop up ads.
- Spyware – Tracks usage information and sends it to third parties
- Ransomware – Blocks access to the data on your machine until you agree to pay a randsom to unlock it.
Phishing attacks can include emails, websites or even phone calls, where hackers impersonate trusted organisations to try to convince you to hand over personal information, or install suspicious software on your machine. For example, you may receive an email that appears to be from your bank, asking you to reset your password. This could then redirect you to a site where you would input your password and other personal data that could be used to access your accounts.
Password attacks and credential reuse –
Phishing is just one way hackers can steal your passwords. Other techniques include brute force password attacks, which involve using automated software programs to try to guess your password. As many people use the same password on multiple sites, once they have your password, hackers will try to compromise and steal data from other sites using the same log in details.
Man in the middle –
This type of attack occurs when a hacker positions themselves between two people or systems communicating over a network. This allows them to intercept data that is being transferred between the two parties, without either side knowing. Conversations that were meant to be private are at risk of MITM attacks, as are sites that require users to login, as the log in data can be compromised.
Protecting Yourself from a Cyber Attack
By working with security experts to understand which type cyber attack you are most exposed to, you can build a secure and effective strategy to help keep cyber criminals at bay.
Though some businesses may see cyber security as an unwanted and unnecessary cost, the true cost to your business of a full cyber attack will be far greater if you fail to take sufficient precautionary action.
See this blog on How to Prevent Cyber Attacks or for more information and advice Contact Us: 0844 770 0199