Small Businesses
Did you know that, on average, twenty percent of small businesses face a cybersecurity attack yearly? Sixty percent of these businesses have to close their doors within six months. In 2010, Verizon did a study with the US Secret Service and found that over 60 percent of data breaches come from businesses with less than 100 employees. Therefore, Cyber Security is an essential part of everyone's life. Without cybersecurity, no one would have a bank account balance when they wake up, no one would have a social media life, and no one would be able to sell items online. -Sam Bocetta
How Many Attacks?
On average, in the United States, every THIRTY-NINE SECONDS has a Cyber Attack! Every year, this will affect one in three Americans. The biggest reason behind this is simple: the usernames and passwords. Passwords such as "Password" or "Password123" or even "wrodssaP," which is Password backward, will NOT work. Likewise, usernames like "User10" or "User10938" will not help you. Due to the daily attacks, these usernames can become compromised by any computer with the right tools.
Standard Methods of Hackers
Hackers' most common methods are phishing, Key Loggers, ClickJacking, Bait-and-Switch Attacks, and Trojans. Below are the methods and how hackers can use them. The point of these methods is to show that most computer viruses come from Human Error.
The Phishing method
This method is well known. It can range from getting a call from "your bank" to an email from "Amazon" about needing your card information to deliver your item. Only click on an email if you can get 100% confirmation about who it is from by calling the official company number or sending a Support Ticket to ensure it is accurate.
Key Loggers
This method is due to a small piece of software that can be downloaded onto your device. A keylogger can be installed from a bad link, or someone physically installed it off a USB (Universal Serial Bus). A keylogger's job is to record every keystroke you type in. So, If you had it and typed in your Password, the hacker would see that Password. This Malware can expose you to everything, from usernames to passwords to credit card information.
ClickJacking Attacks
ClickJacking attacks, as rare as they sound, can be used by tricking a user into clicking on something they believe is real. For example, you are scrolling on Google and seeing an ad for a "Free $50.00 Amazon card!" If you click this link or this Ad, it will either do nothing or bring you to a site that doesn't work. It doesn't sound like a big deal. WRONG. When you click this link or ad, your computer gives the hacker complete control. If a hacker is skilled enough, they could even get one of these on a site like Amazon, and Amazon would only know once too many people have been affected by it.
Bait and Switch Attacks
This attack method is similar to ClickJacking. This method is when a hacker buys an Ad on a website and implements a malicious link in that spot. So when you go to YouTube and see an Ad for a brand new video game, do not click it. Instead, with some advice from the CEO of The Cyber Friend, you look up the game and find it. This method will provide safer results compared to clicking an ad. Clicking this Ad can compromise your system and download Malware onto your device.
Trojans
This method of attack is a well-known one. Many people understand the Trojan Horse's history and how it could sneak past enemy lines. That plan cost the enemy the war and gave the Greek army a victory. The computer version of a Trojan is no different. An example would be to say you are scrolling through the internet, looking for iTunes to download on your Windows device. You see a link saying, "Download iTunes here," and without thinking twice, you click it and download it. That is a Trojan; it snuck right past you in plain sight, got onto your device, and now has complete control.
Copyright © 2021 The Cyber Friend - All Rights Reserved.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.