Understanding the threat landscape | #eBiz Digital | Jayson O’Reilly

BizDigital-on-BizRadio-600x250.jpg

BizDigital

Not a day goes by without the headlines being littered with stories about stolen credit card data, massive data breaches and similar. Most businesses, whether or not they know it have suffered a breach, and many individuals have fallen victim to cybercrime at one point or another.

cyber-crime-hacker-computer To prevent this from happening, understanding what the risks are is the first step, says Jayson O’Reilly, Director of Sales and Innovation at DRS.

“It is impossible to imagine a world without Internet or PCs,” he says. “For the running of our day to day lives, these are essential. Because of this, cyber security affects us all, and knowing how to protect our data, and avoid falling victim to these sorts of attacks is crucial.”

He says the range of risk is wide – from malware that can delete your data or even your entire system through carefully planned intrusions, or threats that take hold of your machine in order to attack other machines or commit DDoS attacks, to the theft of your personal data, that could result in financial losses – the risks are many, and there is no such thing as total protection.

“However, identifying the risks is the first step. The first risk is the hackers or ‘threat actors’, the individual or groups of technically skilled criminals, who write code and attempt to infiltrate your systems. They use vulnerabilities or loopholes, exploiting them for their own nefarious purposes.” Jayson_O_Reilly

The code they write is called malware, or malicious code, that consists of all software that carries out the attackers’ wishes. “Malware can be divided into several sub-categories – Trojans, worms and viruses.”

Trojans, dubbed from the famous Trojan horse, are not the same as worms and viruses as they do not independently replicate themselves. These programs pretend to be performing a specific function, but have a backdoor into the infected machine. Through the backdoor, cyber criminals have access to the machine and all its data, and can use these tools to steal banking credentials and other such information without the user noticing.

Worms, says O’Reilly, come in several forms too. Unlike viruses which attach themselves to executable files, worms spread by transferring themselves via networks or other machines. “Network worms, email worms, peer-to-peer worms, IM worms – are the main types of worms spread by cyber crooks.”

Viruses also replicate themselves in an attempt to spread to other machines. “In order to do this, they attach themselves to other files, or embed themselves in the boot sector of data carriers. Often, they secret themselves onto a computer via exchangeable media such as flash drives, external drives or via the Web.”

Viruses can attach themselves to several different elements of the operating system and can carry out their functions using a broad range of channels. “Viruses also have several different types, namely boot sector viruses, file viruses, multipartite viruses, companion viruses, macro viruses, stealth viruses and rootkits, polymorphic viruses, and email viruses.” drs_logo

O’Reilly says there is no silver bullet, but practising ‘safe’ behaviour, such as not opening suspicious attachments or clicking on dodgy links is a good start. “A good anti-malware solution is also a must. Make sure you keep it up-to-date and patch as soon as possible.”

www.drs.co.za

 

About eBizRadio

eBizRadio is a live multi- platformed social media service providing an online forum to the business community for holding conversations on the key issues related to specific businesses as well as availing a space for cross-business collaboration in response to key issues affecting the world of business. The place to go if you want to know about business and lifestyle
Don't be shellfish...Share on Reddit
Reddit
0Tweet about this on Twitter
Twitter
Share on Facebook
Facebook
0Email this to someone
email
Share on LinkedIn
Linkedin
eBizRadio

eBizRadio

eBizRadio is a live multi- platformed social media service providing an online forum to the business community for holding conversations on the key issues related to specific businesses as well as availing a space for cross-business collaboration in response to key issues affecting the world of business. The place to go if you want to know about business and lifestyle

scroll to top

Login

Please enter the correct answer: *


Register | Lost your password?