Not a day goes by without the headlines being littered with stories about stolen credit card data, massive data breaches and similar. Most businesses, whether or not they know it have suffered a breach, and many individuals have fallen victim to cybercrime at one point or another.
“It is impossible to imagine a world without Internet or PCs,” he says. “For the running of our day to day lives, these are essential. Because of this, cyber security affects us all, and knowing how to protect our data, and avoid falling victim to these sorts of attacks is crucial.”
He says the range of risk is wide – from malware that can delete your data or even your entire system through carefully planned intrusions, or threats that take hold of your machine in order to attack other machines or commit DDoS attacks, to the theft of your personal data, that could result in financial losses – the risks are many, and there is no such thing as total protection.
“However, identifying the risks is the first step. The first risk is the hackers or ‘threat actors’, the individual or groups of technically skilled criminals, who write code and attempt to infiltrate your systems. They use vulnerabilities or loopholes, exploiting them for their own nefarious purposes.”
The code they write is called malware, or malicious code, that consists of all software that carries out the attackers’ wishes. “Malware can be divided into several sub-categories – Trojans, worms and viruses.”
Trojans, dubbed from the famous Trojan horse, are not the same as worms and viruses as they do not independently replicate themselves. These programs pretend to be performing a specific function, but have a backdoor into the infected machine. Through the backdoor, cyber criminals have access to the machine and all its data, and can use these tools to steal banking credentials and other such information without the user noticing.
Worms, says O’Reilly, come in several forms too. Unlike viruses which attach themselves to executable files, worms spread by transferring themselves via networks or other machines. “Network worms, email worms, peer-to-peer worms, IM worms – are the main types of worms spread by cyber crooks.”
Viruses also replicate themselves in an attempt to spread to other machines. “In order to do this, they attach themselves to other files, or embed themselves in the boot sector of data carriers. Often, they secret themselves onto a computer via exchangeable media such as flash drives, external drives or via the Web.”
Viruses can attach themselves to several different elements of the operating system and can carry out their functions using a broad range of channels. “Viruses also have several different types, namely boot sector viruses, file viruses, multipartite viruses, companion viruses, macro viruses, stealth viruses and rootkits, polymorphic viruses, and email viruses.”
O’Reilly says there is no silver bullet, but practising ‘safe’ behaviour, such as not opening suspicious attachments or clicking on dodgy links is a good start. “A good anti-malware solution is also a must. Make sure you keep it up-to-date and patch as soon as possible.”
- Follow your consumers and do it BIG! | #LTM | #Marketing | Kevin Britz | Craig Page-Lee | #Podcast | #ebizradio - January 27, 2022
- How to use emotional intelligence to improve your sales? | The Shift Show | #Sales | #GrowGetters | Shelley Walters | Clive Vanderwagen | The Sales Counsel | Ready People | #ebizradio | #Podcast - January 26, 2022
- Just Talk to People | #Entrepreneur | Word of Mouth | Lindi Tshabangu | Laura Ruthven| Female Entrepreneur SA Magazine | #Podcast | #ebizradio - January 24, 2022
- Can technology take the pain out of recruitment? | #OneEyedMan | Mike Stopforth | Francois de Wet | #ebizradio | #Podcast - January 24, 2022
- Why understanding UBOs is critical |#Insight | #ebizradio | Jason Shedden | Contactable - January 24, 2022
- Making news headlines this week | #News | Kuhle Tshabalala | #Podcast | #ebizradio - January 21, 2022
- Motoring News – Chery Tiggo 8 – Suzuki V-Storm DL-650 | #Motoring | Diesel and Dust | Tumelo Maketekete | #Podcast | #ebizradio - January 21, 2022
- The State We’re In 2022 – Six Trend Pillars for this year | #Trends | #Insight | Dion Chang | Flux Trends | #Podcast | #ebizradio - January 20, 2022
- Female Leadership – Success Factors and Barriers to Overcome | #Insight | #ChangeConversations | Mpume Ncube-Daka | Moloko Komane | #Podcast | #ebizradio - January 20, 2022
- Taming the ‘black swan’ gives rise to the Gig economy | #Opinion | #Mamiki Matlawa | Qunu Staffing | #ebizradio - January 17, 2022