/global/social-media-and-blog/teaser/cybersecurity-awareness-teaser

Cyber Threats

Do You Know These Types of

Do You Know These Types of Internet Security Threats?

This post is the fourth post in our Cybersecurity User Awareness series. Take a look at the other posts in this series:

  1. How to Fight Fraud with Security Intelligence
  2. The 6 Biggest Email Security Risks for Enterprises
  3. Security is Not Privacy: Ways to Keep Personal Data Secure
  4. Building a Mobile Threat Defense for Your Enterprise Devices
  5. How to Cut Security Risks for Remote Workers
  6. 10 Surprising Security Risks in Your Office
  7. Do You Know All Types of Internet Security Threats?
  8. 5 Steps of a Successful Cybersecurity User Awareness Program
  9. How to Reduce Security Risks in the Future

Important Ways to Protect Against Cyberattacks

Organizations need to employ a range of security tactics and solutions in order to prevent cybersecurity threats. Here are a few important processes and technologies that businesses should deploy and optimize to protect against a wide range of threats.

  • Employee training – Employee awareness should be your first line of defense against online security threats. Training your employees to be aware of common threats will help your business avoid them entirely.
  • Strong password policies – A surprising amount of hackers gain access to sensitive data by employing programs that generate combinations of letters, numbers, and symbols until they determine what your password is – for simple passwords, it can be a matter of minutes. A strong password policy can prevent this.
  • Access control – Cybersecurity teams should only give certain users access to certain parts of the network – for example, HR should need special approval to look through the company’s financial records. This will lower how much data can be accessed during a single breach.
  • Firewalls – A firewall provides a barrier that prevents the spread of malware and other unwanted communication between devices. It flags or blocks suspicious content by filtering all network communications that try to enter your device.
  • Endpoint Detection & Response (EDR) – Security software often refers to antimalware solutions enhanced with machine learning algorithms that detect and remove malicious code. It could be a broad solution that covers many different types of malware and ransomware, or it may focus on detecting and removing spyware, viruses, botnets, and similar threats.
  • Monitoring – Monitoring solutions help your IT team stay aware of when strange or dangerous activity is taking place on your network. For example, if an employee is based in country A and then appears to be working from country B, something suspicious may be afoot.
  • Data backup – In the unfortunate case that everything goes wrong, you can be saved by regular backups. Malicious actors often lock away or delete data – with consistent data backups, you can quickly go back to business as usual with minimal data loss.

While there are other security measures and tools available for organizations, this list outlines the most common ways for cybersecurity professionals to resolve threats. Let’s go over how these solutions can be used in practice to confront common security threats.

Malware

Malware is a catch-all term for any kind of malicious software that can damage your computer or network. It includes viruses, worms, trojans, rootkits, and more. Since there are many types of malware, there are a lot of potential ways to confront it – and the best way to resolve a malware attack depends entirely on which type of malware is deployed on your machine.

Generally speaking, employee cybersecurity awareness is one way to prevent malware from ending up on company devices. When education fails, firewalls and antimalware solutions are the next line of defense for preventing, detecting, and destroying malware. Businesses may also use network monitoring to look for signs of malware and use backups if the malware is too complex or entrenched for an antimalware suite to remove.

Ransomware

Ransomware can enter your network using a few different avenues – it often begins with a single successful phishing attempt, although various forms of social engineering may also be employed to gain access to a high-value device. Once the attacker is in, they will find where important data is located, encrypt it, and send a message to leadership demanding that they pay for their data to be decrypted. If you don’t pay, they’ll delete it – or worse, make your most sensitive data public.

You can prevent ransomware attacks in a few different ways. The first line of defense is employee cybersecurity awareness. Your second line of defense is an antimalware solution that will prevent malicious email attachments from successfully infecting your devices. If the ransomware attack succeeds despite these measures, backing up your data preemptively will make deleting it an empty threat.

Spyware

Spyware isn’t a destructive piece of malware all on its own – its primary purpose is to collect information from your company by monitoring pages visited or tracking keystrokes, for example. Users often do not know they are infected with spyware since it doesn’t present many clear signals of its presence and doesn’t pose an immediate threat. Businesses often don’t know there’s spyware on their device until that information is leveraged for nefarious purposes.

To prevent spyware from taking hold, make sure all your devices are up to date to ensure any vulnerabilities have been patched. Further, employees should be discouraged from downloading free software and receive education about how malicious email attachments can execute spyware. If spyware does manage to take hold despite these measures, a dedicated anti-spyware solution or an advanced antimalware solution can often detect and destroy it.

Worms

Worms are often confused with viruses, but they are not the same. Unlike viruses, they infiltrate devices without tricking employees into downloading them and can freely spread from device to device via your company network, sending an identical copy of itself to multiple connected computers.

Since they replicate without the interference of another employee, they can be difficult to remove without a dedicated effort that disconnects computers from the network. It’s easier to prevent worms with tight firewall measures and by preventing employees from downloading documents that contain them.

Botnets

Botnets are like a zombie apocalypse for computers. These infections often begin through a trojan horse virus that’s sent through an email attachment, a malicious popup, or downloadable software. Botnets are often used for distributed denial of service (DDoS) attacks, but can also be used to send spam, access networks, access devices, modify data, infect other computers, and commit similar types of fraud.

Botnets are very difficult to detect - they use small amounts of computing power, can update from within your machine, and many automated antimalware solutions aren’t able to keep pace with the most ambitious botnet masters. For these reasons, they are also difficult to eliminate.

A feasible method to eliminate them is to monitor network traffic and look out for any strange activity, especially by multiple devices at once. They can then be manually removed from infected devices or targeted by specialty software. However, your best option is to avoid them entirely by updating devices and operating systems regularly, exercising caution with downloads and email attachments, and not visiting suspicious websites.

CEO Scams

CEO fraud is a scam where cybercriminals spoof the email accounts of high-ranking individuals in your organization and try to trick an employee into taking a certain course of action. They may ask an accountant to authorize a wire transfer, ask HR to send confidential company information or even strong-arm an employee into buying gift cards using a company credit card. This may seem like a niche issue, but the FBI estimates that CEO fraud is a $26 billion scam.

To prevent it, educate your employees about phishing and whaling CEO scams. Then, put preventive policies in place. For example, the CEO should agree to video call or otherwise prove their identity to an employee when they need money or information. Otherwise, the employee should be encouraged not to send information.

Final Thoughts

It is, in fact, very common for businesses to be targeted by cyberattacks – so businesses should do everything they can to prevent, detect, and/or eliminate threats before they become a full-scale attack. The best way to stay ahead of business risks and threats is to train all of your staff in cybersecurity awareness, leverage software that can detect or eliminate threats, and implement backup solutions for your most important data. By taking these steps, your organization will be able to deflect the majority of cybersecurity threats.

Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment

Author

Bala Sathunathan

Bala Sethunathan

Director, Security Practice & CISO

Cybersecurity

Related Articles

Announcing SoftwareONE as a Microsoft H1 Top Teams Partner

Announcing SoftwareONE as a Microsoft H1 Top Teams Partner

We’ve been named one of Microsoft’s H1 Teams Top Partners. Learn more about the services that brought us here.

Cyber Security Updates 2021-01
  • 16 February 2021
  • Bala Sethunathan
  • Managed Security, Cybersecurity
  • Cyber-Threats

Cyber Security Update January 2021

Be prepared! A data breach doesn’t only strike large enterprises. Read more about the latest attacks where hackers tried to steal personal data.

Cybersecurity 2021 Predictions
  • 12 January 2021
  • Bala Sethunathan
  • Cybersecurity, Managed Security
  • Security, Remote Working, Cyber-Attacks

Cybersecurity 2021 Predictions

What are our 2021 cybersecurity predictions? Keep reading for SoftwareONE’s insights on what your organization should look out for in the coming months.