<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

Tabush Group's Cloud & Managed IT Blog

The 411 on Cybersecurity and Your Firm

Cybersecurity attacks are a constant and growing threat for businesses and organizations. Cybercriminals attempt to access personal data and confidential information through a variety of tactics. With much of the workforce having mobility, firms need a proper, clear, and effective cybersecurity plan to ensure everyone can work securely from anywhere.

Malware
Malware is a catch-all term for any type of malicious software designed to harm or exploit any programmable device, service, or network. Malware includes spyware, viruses, worms, ransomware, and more. A form of defense can be installing anti-virus software, which scans a computer to detect and clean anything malicious.

Ransomware
Ransomware is a type of malware that encrypts files or restricts access to your device, network, or server until a ransom is paid. It is a similar concept to kidnapping someone and demanding money for their release. Ransomware attacks are continuing to increase in prevalence and getting worse. To protect your firm, data must be backed up regularly to the cloud or a local storage device that is not directly connected to your systems that you are backing up.

Phishing
Phishing occurs when a cybercriminal casts a broad net in the hopes of catching a small percentage of unsuspecting victims. An example is an email that has a malicious link or attachment. A best practice is to look for words that may be misspelled or poorly worded, offers and items that may be too good to be true, and requests for personal information or credentials. For more on phishing, check out 5 Ways to Prevent a Phishing Attack.

Password Attack
Passwords are the most used method of authenticating access to a secure information system. A password attack happens when a cybercriminal gains entry to confidential or critical data by acquiring a password. A cybercriminal will use a variety of ways to access someone’s password including social engineering, gaining access to a password database, testing the network connection to obtain unencrypted passwords, or simply guessing.

For more information on cybersecurity attacks, watch a replay of our webinar titled Cyber Risk in a David vs Goliath World.

Topics: Cybersecurity Managed IT