Cyber-attacks considerations, continued

Internet security

Cyber-attacks considerations, continued

cyber-attacks-considerations-continued

 

​IT-systems and information are becoming increasingly valuable assets in most businesses. As these assets become more valuable to you, it is likely they also become increasingly valuable to outsiders and criminals. Access to information and systems may be just as valuable and accessible to criminals today as picking pockets were 50 years ago.

Many think of cyber-attacks as something that occurs to specific organizations because they are specifically targeted by hackers or terrorists. But the reality is that regardless of size and sector, most organizations should consider themselves targets and take action to protect their assets and values.
According to the Norwegian Police Trend Report for Organized Crime 2016, these are the most common IT-crimes:

  • Phishing: E-mails that are sent to a great number of people with the intent to trick people into clicking links, opening attachments or attempting to get recipients to give up confidential information.
  • Vulnerabilities in common software: Links or attachments in e-mails may be used as vessels for viruses that are designed to exploit vulnerabilities in common software applications.
  • Ransomware: Often installed when opening attachments in e-mails. Ransomware may be used to prevent your business from access to files or other applications until a ransom is payed.
  • Unauthorized access to IT-systems: This can be hacking or theft of login information with the intent to get access to e.g. passwords or confidential information.
  • Denial of Service (DoS): This is often an act where a legal service is intentionally overloaded to negatively impact an organizations ability to deliver normal services.
  • Fake web-pages: Fake web-pages may be set up in an attempt to get access to login data to e.g. online banking.

Be prepared and take appropriate action to avoid or handle attacks on your IT-systems before they happen.

 

harald
Harald Axelsen
March 2nd, 2017
Linkedin Facebook Twitter
Read also
Internet security
Pilotech opens office in Stockholm, Sweden
Pilotech is pleased to announce that Sandra Strandberg has joined the Pilotech sales team as Sales Executive for the Swedish market.…
harald
Harald Axelsen
March 13th, 2019
Internet security
Crisis Management in IT and Telecom
All databases were suddenly running dramatically slow causing a very high variance in latency causing several core systems and numerous end-user…
harald
Harald Axelsen
February 17th, 2019
Internet security
Handling unwanted incidents in Aviation
A small plane crash in Poland killing 3 people will create headlines in Spain. The same day 5 people dies in…
harald
Harald Axelsen
January 29th, 2019
More articles ->

Create security and be prepared with InCaseITTM emergency response systems.

Leave your e-mail address and get a demonstration of InCaseIT, or contact one of our specialists.

This site uses cookies to anonymously analyze your traffic on this webpage. By closing this dialog box or continue using the site, you comply with this.