Best Cybersecurity Practices

posted in: Uncategorized

Learn cybersecurity skills and how to stay safe online

When working online at the office or offsite, it is important to understand cyber threats and how to identify activities that may leave organizational/business information compromised.

Many small businesses are vulnerable to cyberattacks.

What is Cybersecurity?

Cybersecurity is the application of technologies, processes, and controls to protect vital organizational/business systems, networks, programs, devices, and data from cyber-attack(er)s.

Cyber-attacks and security incidents continue to increase; profit-motivated criminals looking to steal money or data or impact your operations.

Malicious and non-malicious threats use a wide range of tactics to target their unsuspecting people, processes and technology in organizations and businesses.

Threats

  • Hackers: a person/thing who/that uses computers to gain unauthorized access to data
  • Organized Crime: criminal activities that are planned and controlled by powerful groups and carried out on a large scale
  • Hacktivists: a person who gains unauthorized access to computer files or networks to further personal/political ends
  • Insiders (Malicious and Non-Malicious Activity): a person within a group or organization, especially someone privy to information available to others

Tactics and Techniques (used to target people, processes & technology)

  • Ransomware Attacks: type of malicious software (malware) that threatens to publish or block access to data or a computer system.
  • Unpatched Assets: are the vulnerabilities in a program or code that a company is aware of and will not or cannot fix.
  • Malware: software that is specifically designated to disrupt, damage, or gain unauthorized access to a computer system.
  • Business Email Compromise (BEC): a type of scam targeting companies who conduct wire transfers and have suppliers abroad.
  • Distributed Denial of Service (DDoS): attacks are a subclass of denial-of-service attacks involving multiple connected online devices, collectively known as a botnet.
  • Insider Threats: an insider threat is a security risk that originates within the targeted organization (employee, consultant, former employee, business partner, or board member).

 

For more information or to request a FREE PDF document, please email Shannyn at info@rustructconsulting.com

Leave a Reply

Your email address will not be published. Required fields are marked *