Cyber Security

  • Home
  • Cyber security
high speed train

Cyber Attacks – what are the risks and can you afford to ignore them?

Recent attacks on eBay, Sony Pictures, Target and JP Morgan have raised the visibility of cyber-crime, the effects of which can be quite debilitating including loss of productivity, physical cost and not least, reputation.

So, how likely is it to happen to your business and how much could it cost you?

According to FBI Director James Comey, there are two kinds of big companies in the United States.  There are those who’ve been hacked…and those who don’t know they’ve been hacked.”

Cybercrime is estimated to cost global businesses £27 billion a year.  The cost of data security breaches for companies in the UK ranged from £160,000 to £4.8 million last year with the average cost of a data breach to a UK company now £1.7 million.

If you’re a small business owner and think the threat is only to larger organisations – think again.

In their latest annual Internet Security Threat Report, Symantec found that 31% of all targeted attacks were aimed at businesses with less than 250 employees.

From attacks by gifted teenage amateurs who have nothing better to do in their spare time than to compromise the networks of multinationals through to fraud and criminal activity, attacks are becoming increasingly sophisticated.

To make the transition from an easy target for cyber criminals to a much more formidable adversary, contact us on 01642 248 750 or info@adnetworksolutions.co.uk.

Top Exploited Product Categories

Infrastructure / Network

Application / Operating System

Content Management System

ICS-SCADA

Source: Cisco 2015 Annual Security Report

Please note, some of the statistics above have been combined to reduce the number of categories. To view the full report, please follow the link.

Types of Cyber Attacks

Backdoors

A backdoor in a network or computer system is a method of bypassing normal authentication and securing remote access, whilst attempting to remain undetected. These can take the form of an installed program or a modification to an existing program or hardware device.

Direct-access Attacks

A Direct-access attack is when an unauthorised user gains physical access to an open network or a computer. This can allow the user to: make Operating System modifications, distribute/install software worms or keyloggers and download large quantities of data, amongst other things.

Spoofing

Tricking or deceiving computer systems or other computer users by hiding an identity or falsifying the identity of another user.

Exploits

This is when a software tool designed to take advantage of a poorly secured network, an un-patched flaw or an error in a computer system or a piece of software.

Denial of Service Attacks

The aim of a Denial of Service Attack is to render a system or network unusable. There are many different methods used in these attacks, a common method is distributed denial-of-service (DDoS), where multiple systems flood the bandwidth or resources of a targeted system or network, rendering it unusable.

Indirect Attacks

An Indirect Attack is when the attack is launched using a third-party computer, this method makes it much more difficult to track down the actual attacker.

Information Disclosure

When information, thought to be secure, becomes available in an untrusted or public environment.

Eavesdropping

Eavesdropping refers to the unauthorised monitoring of other people’s communications. It can be conducted on ordinary telephone systems, emails, instant messaging or other Internet services.


Make An Enquiry

Enquiry form

Full Name

Company

Contact Number

Email

Enquiry

captcha