Part 3: Most Common Cyber Attacks against Businesses, According to Cisco
Malware is a collective name for a number of malicious software variants that includes trojans, worms, spyware, ransomware and viruses. Malware typically consists of code developed by cyber attackers, designed to cause extensive damage to data and systems or to gain unauthorised access to a network. Malware is typically delivered in the form of a link or file over email and requires the user to click on the link or open the file to execute the malware.
A phishing attack occurs when cyber attackers send fraudulent emails pretending to be from a trusted source but lead people to inadvertently deliver personal or professional information straight to a hacker via a malicious website link.
A denial of service (DoS) condition is accomplished by flooding the targeted host or network with traffic until the target cannot respond or its system simply crashes, preventing access for legitimate users. Services affected may include email, websites, online accounts (e.g., banking), or other services that rely on the affected computer network.
A man-in-the-middle (MitM) attack is when an attacker intercepts communication between two parties either to secretly eavesdrop or modify traffic traveling between the two. Attackers might use MitM attacks to steal login credentials or personal information, spy on the victim, sabotage communications or corrupt data.
SQL injection (SQLI) is a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed. This information may include any number of items, including sensitive company data, user lists or private customer data. The impact of SQLI can have on a business is far-reaching. A successful attack may result in the unauthorised viewing of user lists, the deletion of entire tables and, in certain cases, the attacker gaining administrative rights to a database, all of which are highly detrimental to a business.
A zero-day exploit is a cyber attack that occurs on the same day a weakness is discovered in software. At that point, it’s exploited before a fix becomes available from its creator.
Protect Your Business from Cyber Attacks
Small and medium-sized businesses need to take this threat seriously, educate employees and put in place security measures so they don’t expose themselves to risk. If you’re concerned about your cyber security, contact Stratium Global and see how we can help.