Phishing is a scheme that tricks users into opening an email attachment, usually pretending to be from a trusted source, for example ‘missed parcel delivery’ from Amazon. The attachment may appear perfectly normal, however behind the supposed PDF, DOC, or PPT is an executable file that infects the computer with a virus as soon as the attachment is opened.
Web App Attacks is the most common way for your data to be copied without your knowledge. Criminals pretend to be a trustworthy website to install malware on your computer so they can discover your passwords and credentials they need to gain unlawful access to information.
Ransomware is a criminal business model where a virus infects a computer or network and makes changes (usually encrypting files) which forces users to pay a financial ransom is order to be provided with a fix or decryption key. The majority of business pay the ransom as data is one of their most important assets.
User error, is the most common threat to your data is user error, this is commonly due to users deleting or moving files to the wrong location. It has also been known for employees to accidentally disclose data by emailing sensitive information to the wrong contact, or accidentally posting certain information to a web server.
Insider misuse, this includes employees using storage devices or cloud services to transfer company data away from the business network, this data can include intellectual property or customer’s payment data. This threat has increased through the inability of a majority of organisations to monitor and secure access to data with respect to mobile devices and cloud storage.
Crimeware, this malicious software is designed to steal a person’s online banking credentials. The software appears on workstations often due to the unintentional downloading of a virus through a pop-up window, usually pretending to be a security check.
Distributed denial-of-service (DDOS) attacks are the biggest threats to companies in the financial, retail and public sector. Cyber criminals create a sudden increase in online traffic to cause the companies site to load very slowly for legitimate users, sometimes the traffic is enough to shut the site down completely.
Point-of-sale (POS) hacks – the hackers aim is to gain access to millions of customer’s credit card numbers, normally through gaining access to corporate website databases where consumer data is stored. 2013 saw many high-profile breaches reported in the media.
Credit/Debit card skimmers, traditionally these are most common at cash machines and ‘pay at the pump’ petrol stations. A skimming device is added to a machine which records your card details and PIN. Lately this has become even more advanced with data being collected via Bluetooth or other wireless devices when you buy online.
SystemCare can provide you with multi-layered IT protection from cyber threats.