Hello.
We are

  • Expert

How Can You Protect Your Business From a Cyber-attack? Part. One

As the value of cyber space persistently increases in the world of business, so too does the likelihood of cyber-crime. “In 2012, Kiwis lost over $4 million from phishing and scams. Many forms of cyber-attacks are becoming more sophisticated and harder to detect” says Chief Operating Officer of IT security company Eset APAC, Lukas Raska, in a recent report. Due to these statistics we have decided to cover the issue of cyber security in a series of blog posts.

At the end of last year multinational business SONY Pictures experienced a debilitating cyber-attack that allegedly went on for over a year before it was apprehended. The hackers obtained much of the company’s confidential data; including details and emails of employees, as well as unreleased films.

Attacks of this nature occur on a regular basis across companies of all shapes, sizes and locations. Does your business have a practice for safeguarding its cyber security?

What is a Cyber-attack?

A cyber-attack can be any type of offensive act toward computer information systems, infrastructures and computer networks - attacks can be made against a personal, or business system. The source of the attack (often known as the hacker) may try to steal, alter or destroy the targeted infrastructure.

Over the years, cyber-attacks have become more sophisticated and dangerous, providing hackers the opportunity to make money via your potentially penetrable system. It is your duty to one-up cybercriminals with an educated approach to your IT security.  

Cyber Security Jargon:

Antivirus: software designed to detect and destroy computer viruses and malware.

Firewall: A Firewall is a network security system that controls incoming and outgoing network traffic. It creates a protection barrier between a trusted internal network and another network that may not be trusted (e.g . the Internet). A firewall can be either hardware or software based.

Phishing: Phishing is an email fraud method that attempts to gather personal and financial information from the receiver (e.g. passwords).  Phishing scams are usually delivered via a simple legitimate looking email, but the possible harm to your computer’s network could be enormous. The SONY attack was allegedly caused by a basic phishing email. 

Malware: Malware is short for ‘malicious software’ that has been designed to damage or disrupt a computer system. In some cases malware infected computers can be controlled by the hacker, who could use it to send malware to others.

Trojan: Trojan, or Trojan horse, is a type of malware that is disguised as a normal programme. It persuades the user to run a programme that appears as routine, useful or interesting - thereby allowing the hacker/s to perform an attack.

Part. Two of the cyber security series here

 

Contact us.

Let's start a conversation about your web presence today
Phone: +64 4 384 9833 | Email: us@expert.services
Address: 19 Tennyson Street, Te Aro, Wellington 6011, New Zealand
Postal address: PO Box 6474, Wellington 6141, New Zealand

To send us an email, please complete the form below...