Understanding Cybercrime

13 April 2016, 12:17 BST
By Adam Flynn

Businesses that frequently use the Internet as part of their day-to-day operations without adequate protection, will almost certainly acquire some form of malware or computer virus, with more than 317 million new pieces created last year alone.

At a minimum, your business should have anti virus and firewall solutions, but as computer and Internet technology continues to evolve, so does cybercrime and the methods used to exploit your business.  Here are some of the most common and widely used cybercrimes in today’s virtual environment;

Cyber security hacker tools on desk and laptop

Identity theft:

As one of the most common forms of cybercime, ‘online identity theft’ has some of the most far-reaching financial and reputational implications. Commonly associated with the act of a person purporting to be another, online identify theft will target businesses that contain confidential data, such as credit card information, addresses and email ID’s for fraudulent and financial gain.

Botnets:

A botnet (also known as a Zombie army) is a network of compromised computers, that unbeknown to their owners are controlled by remote attackers to forward transmissions such as spam or viruses to other computers on the Internet. Computers that are chosen to join the ‘Zombie army’ are those that have failed to provide effective firewalls and other safeguards, and have been left open to a small Trojan horse programme that can access your network and be left for future activation.

Spam & Phishing:

Spamming and Phishing are two of the most common forms of cybercrime. Spam is simply unwanted messages and email, sent via spambots that clutter your inbox.  Embedded in these is the method of Phishing, where information is used as bait such as lottery wins, prize draws or online claims, aiming to get your data and get your money. If it sounds too good to be true, it usually is.

Ransomware:

As one of the most detrimental forms of malware-based attacks, Ransomware is a growing problem that is affecting businesses globally. Ransmomware enters your network and encrypts your files, essentially keeping the encryption key and your files hostage until a financial ransom is paid.

Malvertising

Malvertising is a method whereby a user simply clicks on an online advertisement, triggering the download of malicious code. Websites are usually completely innocent to this, with cyber criminals now showing ‘clean ads’ for a period of time, before replacing these with encrypted ‘malverts’.

Exploit Kits:

Targeting vulnerabilities in the coding of software enables cyber criminals to gain control of your computer, through the use of ready to use tools (exploit kits).  These are now freely available in the Internet market place from hacking forums and are upgraded just like normal software. The only difference being, these are illegal.

Understanding the importance of business security, Halesowen based EBC Group provides state of the art network security to businesses across the Midlands.

‘EBC Group’s security solutions can add vital layers of protection to businesses of any size’ says Stuart Burrows, Group Operations Manager at EBC Group. ‘Our intrusion protection technology provides real time protection against network threats, in addition to offering the latest and most advanced filtering systems and anti-spam systems direct from their privately owned duel data centres.’

For businesses looking to find out more information, about cyber security and the solutions available, please contact 0121 585 4412 or hello@ebcgroup.co.uk.

You might also be interested in

Arrange a FREE IT Audit for your business

Get your free consultation