Not a day goes by without the headlines being littered with stories about stolen credit card data, massive data breaches and similar. Most businesses, whether or not they know it have suffered a breach, and many individuals have fallen victim to cybercrime at one point or another.
“It is impossible to imagine a world without Internet or PCs,” he says. “For the running of our day to day lives, these are essential. Because of this, cyber security affects us all, and knowing how to protect our data, and avoid falling victim to these sorts of attacks is crucial.”
He says the range of risk is wide – from malware that can delete your data or even your entire system through carefully planned intrusions, or threats that take hold of your machine in order to attack other machines or commit DDoS attacks, to the theft of your personal data, that could result in financial losses – the risks are many, and there is no such thing as total protection.
“However, identifying the risks is the first step. The first risk is the hackers or ‘threat actors’, the individual or groups of technically skilled criminals, who write code and attempt to infiltrate your systems. They use vulnerabilities or loopholes, exploiting them for their own nefarious purposes.”
The code they write is called malware, or malicious code, that consists of all software that carries out the attackers’ wishes. “Malware can be divided into several sub-categories – Trojans, worms and viruses.”
Trojans, dubbed from the famous Trojan horse, are not the same as worms and viruses as they do not independently replicate themselves. These programs pretend to be performing a specific function, but have a backdoor into the infected machine. Through the backdoor, cyber criminals have access to the machine and all its data, and can use these tools to steal banking credentials and other such information without the user noticing.
Worms, says O’Reilly, come in several forms too. Unlike viruses which attach themselves to executable files, worms spread by transferring themselves via networks or other machines. “Network worms, email worms, peer-to-peer worms, IM worms – are the main types of worms spread by cyber crooks.”
Viruses also replicate themselves in an attempt to spread to other machines. “In order to do this, they attach themselves to other files, or embed themselves in the boot sector of data carriers. Often, they secret themselves onto a computer via exchangeable media such as flash drives, external drives or via the Web.”
Viruses can attach themselves to several different elements of the operating system and can carry out their functions using a broad range of channels. “Viruses also have several different types, namely boot sector viruses, file viruses, multipartite viruses, companion viruses, macro viruses, stealth viruses and rootkits, polymorphic viruses, and email viruses.”
O’Reilly says there is no silver bullet, but practising ‘safe’ behaviour, such as not opening suspicious attachments or clicking on dodgy links is a good start. “A good anti-malware solution is also a must. Make sure you keep it up-to-date and patch as soon as possible.”
- Have you considered living and working in the USA? Reinventing yourself abroad |#LTM |#KevinBritz |#BjornSalsone |Andrea Magni |#Marketing |#Podcast - September 24, 2020
- Vator Pitch? What is it and why do you need one? |#KevinBritz |#LTC |Toyin Ademola |#Podcast |#ebizradio - September 23, 2020
- The Attention Economy and its Impact on Media |Donald Mokgale |#LetsTalkDigital |#AudreyNaidoo |#Carat - September 23, 2020
- Broke, homeless but resilient |#LTC |#KevinBritz | Heidi Poulton |#Wellness |#Podcast |#ebizradio - September 22, 2020
- Democratising Investing| #eBizInsights | Sebastian Patel| #Podcast |#FRANC - September 22, 2020
- How 10 minutes can literally change you as a leader |#LTL |#KevinBritz |#Naomi Basson |Nick Howes |#Leadership |#Podcast - September 21, 2020
- #InclusivityMatters |#LTC | Candid Conversation |#KevinBritz |#Podcast | Lauren Britz - September 18, 2020
- Going Dutch and reinventing yourself on a bicycle |#KevinBritz |#LTC |#BjornSalsone |Tanya Kovarsky |#Podcast - September 17, 2020
- How to create a job search strategy to the hidden job market|#LTC |#KevinBritz | Chantelle Botha |#Podcast - September 16, 2020
- Roboteur takes the tedium out of repetitive tasks| #eBizWires | Graham Fry | Podcast - September 16, 2020