Retrieve your login information


Do You Know What Cyber Crime Looks Like?

Every business has data that is valuable — and hackers are anxious to get their hands on that data. The problem is this — hackers have numerous avenues by which they can steal or destroy your data. And the majority of us aren’t familiar with the different types of cyber crime, or we don’t even realize that a computer intrusion is a crime.

To protect yourself, your business and your family, it’s important you become familiar with the different types of computer intrusions.

  • Viruses. A small piece of software that attaches to a program on your computer and then can spread to other programs in your computer and the computers of others to manipulate data. Viruses are often triggered when someone downloads an infected document.
  • Worms. A computer program that copies itself from machine to machine and bogs down the system. Worms can enter your computer via holes in software or operating systems.
  • Trojan horses. Trojan horses must be introduced to the system by a user. This usually happens when someone unwittingly downloads an email attachment that runs an .exe file.
  • Spyware. Can be used by hackers to track Internet browsing habits or collect personal information. These are installed on your computer by downloading a file from an untrusted source.
  • Logic bombs. A piece of code that is triggered by an event. Logic bombs can, for example, erase all files on a computer’s hard drive.
  • Denial of service / distributed denial of service attacks. Used to send an overwhelming amount of data to a server, rendering it useless. This can shut down online sales or orders for a business.

To prevent these computer intrusions, be certain your employees are aware of the risks of opening suspicious emails or emailed documents. Also, be certain to update your computers’ operating system and applications when they become available as these usually contain important security updates.

Comments are closed.