Cyber-Attack Tactics

Here at Business Computer Solutions, your security is our priority. The use of an industry leading 24/7 remote monitoring service is included in our client support agreements, enabling us to detect faults and implement mechanisms that can help prevent downtime. We understand how important your organisation’s data is and the need to protect it. Business Computer Solutions believe in ensuring you get the best from your IT investment and offer a wide portfolio of services designed to protect your systems and most importantly your data in any scenario.

Each year, more sophisticated ways of retrieving your data illegally are being reported and cyber-attacks are evolving and occurring more than ever. Our team of helpful ninjas have provided some useful terminology in how your data may be retrieved through a cyber-attack:

  1. Baiting – A USB drive or another electronic media device is passed to you, which is pre-loaded with malware.
  2. Clickjacking – Concealing hyperlinks beneath legitimate clickable content, which when clicked, downloads malware.
  3. Doxing – Publicly releasing a person’s information, typically retrieved from social networking sites.
  4. Cross-site scripting – When a malicious code is injected into a website.
  5. Social Engineering – A strategic use of conversation to extract information from people without giving them the feeling they are being scammed.
  6. Pharming – Redirecting users from legitimate websites to fraudulent ones for the purpose of extracting confidential information.
  7. Phishing – An email that looks like it is from a legitimate organisation or person, but actually contains a link or file with malware.
  8. Spoofing – Deceiving computers or users by hiding or faking ones identity. Email spoofing utilises a fake email address or simulates a genuine email address.
  9. Keystroke logging (Key logger) – Spyware that is used for covertly recording the keys struck on a keyboard. The log file created by the key logger can then be sent to a specified recipient. By examining the key log data, it may be possible to find private information such as usernames and passwords.

If you would like any advice on your current security or to find out how BCS can benefit your organisation, please call our friendly, helpful and knowledgeable team on 01843 572600 or email hello@365itsupport.co.uk. You can also read our previous blog posts in our ‘Reviews & Helpful Tips’ section, which contains useful blog posts about security issues.

Menu