Cyber Security
Businesses in Australia have experienced over 76,000 digital attacks over the last 12 months, with each reported cybercrime costing an average of $39,000 for small businesses, $88,000 for medium businesses and $62,000 for large businesses.
Common types of cybersecurity threats
Malware, short for malicious software, is software used to gain unauthorized control of a victim’s computer systems, to then steal personal information, encrypt important files, or cause (sometimes irreparable) damage. There are many types of malwares, including:
Virus – a self-replicating program attaches to a clean file which then spreads throughout the whole computer system while infecting files with a malicious code.
Trojans – malware disguised as legitimate software, that can cause damage or collect data once uploaded by the victim.
Spyware – malware that secretly records what the victim is doing, cybercriminals can steal personal information such as credit card details through this.
Ransomware – malware that encrypts a victim’s files, blocking access to them, until a ransom is paid. Cybercriminals can threaten to erase the victim’s files if the ransom is not paid.
Adware – malware that displays advertisements, these can be used to collect data to deliver more personalized ads or spread malware. WorkSafe point out that all trees pose a risk of falling over or dropping branches.
Phishing is fraudulent activity that aims to steal a victim’s money or identity, by getting them to reveal personal information, such as credit card information or login details. This is usually done by electronic communication, such as emails, from seemingly reputable sources.
Romance scams are when cybercriminals adopt a false identity to gain a victim’s affection and trust. The criminal can then use these misguided feelings to manipulate or steal from the victim.
Cybersecurity Software
End-user protection is software that secures the end or entry-points of user devices, such as laptops, computers, and mobile phones. These devices can be exploited by cybercriminals for entry into the corporate network.
Therefore, securing each device prior to its entry into the corporate network by using encryption and application control allows for greater security control on entry points and detection and blocking of risky behaviours.
End-user security software also scans devices for malicious codes. If identified, the malicious codes are quarantined then removed from the device. Cybersecurity software can also encrypt information while it is in transit, protecting it from loss or theft.
Cyber Safety Tips
Due to the volume and variety of cyber-attacks, it is important that individuals learn how to protect themselves. Here are some tips to keep yourself safe from cyberattacks:
Use two-/multi-factor authentication, this is where websites or applications require a second verification method after inputting your login details.
Use a password manager. This ensures that your passwords are not easy to guess.
Be wary of unfamiliar links. Think before you click on websites that you do not recognize or links that are sent by someone you are not familiar with.
Keep your software and operating systems up to date. This ensures that you have the latest security updates from the manufacturer.
Use anti-virus software. These will identify and remove malware from your device. Ensure that this software is updated for the best level of protection.
Do not open email attachments from unknown senders. These files may be infected with malware.
Avoid using unsecure Wi-Fi networks in public spaces. These make your device vulnerable to man-in-the-middle attacks, where a cybercriminal may be eavesdropping or manipulating the information you are sending to another person.
For more information on how to be cyber safe, check with your IT specialist.