Site Notice: Just to make you aware we are still open for business as usual.
Cyber Security is a buzz word in the UK business world right now and one that we recommend you take very seriously. But who are these cyber criminals? What is it you are at risk from? Why do they do it?
When HBT is contacted by a business whose computer system has been compromised by an attack, the call is passed to Engineer Junaid Shazad, who has extensive experience in dealing with results of a computer hack.
Junaid is keen to educate business owners of the dangers as he explains, “Cyber criminals, or hackers, may just want to cause disruption; to have a bit of “fun”, or they may have more sinister motives; to steal your data, corrupt your computer network or gain financial rewards through blackmail or corrupt transactions. They are clever and do what they can to avoid detection for as long as possible. The malicious software they plant (often referred to as malware) will sit dormant on your systems in the day and then spring into action at night when your business is closed and no-one is monitoring your computers. When you come in the next morning, the damage is done.”
Junaid continues, “These malwares come in various shapes and sizes, with different results and consequences. To help you sift through the jargon, we have compiled a list of the most common forms of malware and the damage they can cause.”
Junaid has listed the four most common forms of security breaches:
1. Viruses – a small piece of code which spreads infection across computers by attaching itself to files.
The Damage? Information can be stolen, modified or corrupted.
2. Worms – wriggling through vulnerabilities with your operating system, worms self-replicate and report back to their original creator when weaknesses are found.
The Damage? Your networks can be corrupted and remote control taken of your computer system.
3. Spyware/Adware – installed on your computer when you open infected attachments or click on corrupted links.
The Damage? Personal information, including passwords can be collected, enabling the user to log in as you to secure sites, such as your bank. This malware can also give someone control of your computer.
4. Trojans – just like the Trojan Horse, a programme you run will appear harmless, but in the background run malicious software without you noticing.
The Damage? Opens a way in to your computer allowing information to be stolen or damage to be caused.
5. Phishing – a fraudulent attempt by cybercriminals to deceive individuals into providing sensitive information, such as passwords or financial details, often by impersonating trustworthy entities through email, text messages, or fake websites.
Junaid finishes, “These attacks are all computer generated by the hackers. Each hour hundreds of thousands of computer systems will become potential victims– no-one is safe from attack. To protect your business, you need to have a robust security system in place; one that is regularly updated to protect you against the latest malware attack.”
When did you last review your computer network security? HBT Communications provides a complimentary, no-obligation security review.
Book yours today by calling us on 02476 867 422 or completing our short security review form.