Cyber Attack Overview

The evolution of business security threats

Last updated Friday, August 3, 2018

Cyber attacks are still aimed at weaknesses in servers and network-connected devices with alarming regularity, however the growing trend over the past several years has been to exploit human vulnerabilities as well. Most attacks against people and machinery begin as fully automated processes that run unattended on thousands of compromised machines with one main goal: Obtaining credentials for further exploitation. With the rise of these so-called "botnets" small and medium businesses are now more likely to become victims of a cyber attack. Why? Because they can be targeted at the same rate as large businesses, but they often lack the experience, expertise and resources to adequately defend themselves. Attacks take many forms: Ransomware encrypts your computers and demands substantial payment to recover your data. Malware steals your client lists including social security numbers and contact information. Data can be sold, or in some cases used in further attacks, including social engineering.

More layers means better protection.

Multiple defense layers help protect your information (and reputation) so each new measure you deploy makes it that much harder to breach your defenses. 200,000 new malware signatures are detected every single day. If one of these variants makes it past one filter, the next filter may catch it. The more sophisticated you make your layers, the better your security becomes.

Where does it end?

Attacks don’t just arrive via email. They can be launched from malicious code in a website, they can start with an advertisement or post on Facebook, or they can arrive via means that bypass traditional filters - for example, a phone call, a fax or even a text message. As long as it’s profitable to steal or lock company information, and easy to remain anonymous, the attacks will continue. For this reason, it often makes sense to strengthen defenses by taking further measures.


Filed Under: Security


Contact Us Share via Email All Articles