IS USING INTERNET SAFE?

Continuation of the previous blog. This is the Part 2 of Company's IT Security That You Should Avoid
Here we go…
Rootkit
It is software that allows cyber intruders to access
computers without being detected to steal sensitive information. Rootkits allow
privileged access to a user (the hacker), who connects remotely, altering the
operating system to hide the maneuver.
A real risk for companies and users, who can have their
access codes, bank details, etc. stolen.
To be safe have an updated antivirus that will give
you complete security and fight again all the odds.
Although there are also versions that work through devices
or hardware accessories, we are basically talking about programs that can reach
a computer through viruses, Trojans, etc., and that are dedicated to memorizing
the keystrokes made by the user. The information is recorded in a file and can
be sent over the Internet.
As you can imagine, cybercriminals can get hold of all
kinds of passwords, bank details and any other kind of private information.
Man In
The Middle Attack (MITM)
It is a type of attack in which the hacker intercepts
traffic that travels from a sending computer to another receiver. That is why
it is called Man in the middle, which in Spanish means “Man in the middle”.
By becoming an intermediate point through which information
passes from its place of origin (an employee's computer, for example), to a
destination site (let's say it is the company's server), the cybercriminal can
decrypt the data and get hold of keys and passwords.
DOS
attacks
Having the company website down for some time can lead to
significant financial losses, especially if it is an online store!
That is the goal of Denial of Service (DOS) attacks, or
"denial of service." A computer launches requests to the server where
the website is hosted until it saturates it and begins to deny access. The web
falls with its corresponding losses in sales, business opportunities, etc.
To stop the attack, just ban the attacker's IP. But if the
time the web remains down is long enough, the losses have already taken place
and the damage is done.
DDOS
attacks
The concept is the same as in the previous threat: massive
requests are made until the server is saturated and the web falls; however, the
attack we are talking about now is a Distributed Denial of Service (DDOS), and
it is more sophisticated than the previous.
Instead of launching attacks from a single computer, DDOS
attacks use many computers to distribute requests to the server. Often times,
these computers belong to users who do not know what their computers are being
used for, who have been added to a zombie network by hackers infecting them
with malware.
The problem with this type of attack is that having a
multiple origin is more difficult to find out all the IPs from which it starts
and, therefore, it is more difficult to stop.
And these threats are only the tip of the iceberg! They are
the most common, but there are many more.
In addition, with the revolution of the Internet of Things
(IoT) or “Internet of things”, the challenges to device security are expected
to increase massively. The increase in devices and consumer goods with access
to the Internet will stimulate the development of new threats of all kinds.
You may fear that you will never sleep peacefully again
thinking about the number of cyber threats that threaten your company, but do
not worry. Not everything is lost!
What
can I do to prevent information theft and other computer security problems?
We would like to reassure you by recommending the latest antivirus on the market…
But unfortunately, installing antimalware is not enough!
To guarantee the computer security of your company and
prevent threats, identity theft, data theft, extortion, industrial espionage
and a long list of problems, it is best to implement security protocols.
The variety of measures that can be taken to prevent
security threats ranges from updating all software, to configuring and managing
servers, to installing antivirus
and other security software.
Comments
Post a Comment