First on our list of cyber criminal tactics is the use of persuasion and manipulation to get people to do an action such as click a link, open an email attachment, download a program, or give out information (such as credit card numbers, bank credentials), or grant access to other accounts. Many of the following cyber crime tactics are combined with social engineering.
Generally speaking, malware is any piece of software that is intended to do harm. Malware is delivered in many ways including clicking links, opening attachments, downloading software and just by browsing the internet. The following is a sample of commonly used malware.
This is one way that cyber criminals get access to your device. You unknowingly encounter this threat as you are browsing the web or interacting with fake online ads. These kits look into your machine to find a backdoor through a piece of outdated software.
Viruses get their name from their ability to spread from computer to computer. They can corrupt your files, send out spam to your email contacts, take over your machine and steal your login credentials by recording the keys you press for a username and password.
Ransomware can be delivered in different ways, but once it gets to your computer, network or mobile device, the result is the same. You are locked out and a ransom is required to get back in. Paying the ransom does not always guarantee release of your data and device.
This type of malware masquerades as a familiar program, or makes the user believe that they need it, so they inadvertently make a click that initiates its installation. Trojans carry other malware such as keyloggers that can gain access to your accounts by recording the keys as you type in your username and password.
Email and Phishing
Phishing involves sending out emails that look like they are from a trusted person or organization with the purpose of getting the recipient to click on a link or open an attachment that will unload malware. Some phishing schemes ask the recipient to transfer money or give the sender access to other financial resources. The source of the email can appear to be from an organization or a specific person that you know.
Phone Call Cyber Attacks
The goal of this irritating tactic is to get a person to either give up information or to persuade the person on the line into taking an action that will give the hacker access to their computer or network. Phone scams can be very targeted with their attack, possessing information about the recipient that leads them to believe that they can be trusted.
Cyber criminals don’t just operate online, they can walk through your front door. Maintaining the security of your office space includes limiting access to your server room, locking workstations when not in use and never leaving post-its or other notes with login credentials where someone could easily pick them up. While you might envision intruders sneaking their way into your facility, you should not discount potential threats from people who have a reason to be there whether they’re visiting or are one of your employees.