Take Practical Measures To Avoid An Attack

According to British Government statistics, approximately 2.39m cyber crimes have been recorded against UK businesses in the last 12 months and, as more businesses have chosen to move online, and with technology constantly changing, cyber attacks have become a common issue. 

“Cyber security breaches and attacks remain a common threat. However, smaller organisations are identifying them less than last year... This may reflect that senior managers in smaller organisations view cyber security as less of a priority in the current economic climate than in previous years, so are undertaking less monitoring and logging of breaches or attacks,” says the 2023 UK Government Security Breaches Survey.

These attacks are leaving owners increasingly vulnerable and concerned for the security of their data. With this in mind, Indusface has provided some industry tips on how scams can be avoided and how to securely protect your online business from being hacked in these unprecedented times. 

Venky Sundar,  President of Indusface, has revealed some of the methods that hackers uses to demonstrate how easy it is for a cyber attack to occur.

Run Probes:    Hackers don’t really know your application. The first step is for them to understand the weakest link in your online business application. They can use any of the numerous open-source and free DAST scanners to find open vulnerabilities.  Once they understand vulnerabilities, the next step is to send targeted attacks like an SQL injection to get access to confidential data, encrypt it and then demand ransom.

Take Your Website Down: Hackers use Distributed Denial of Service (DDoS) Attacks to take down websites. It is as cheap as $5 to launch a targeted DDoS attack for a duration of 1 hour. Downtime’s impact could be revenue lost for that duration, cost incurred for restoring operations and a brand image hit that will prevent people from coming back to you.

Takeover Your Admin Consoles:   Running a brute force attack is probably the simplest form of attack. The hacker would use a script to repeatedly hit your admin consoles with various username/password combinations and, when successful, this leads to a demand for ransom too.

Steal Credit Card Information:   Payment processing is the heartbeat of any online business. It is also amongst the most targeted areas in an online application where hackers try to inject code into the payment processing page and just skim all the credit card details that are entered. They store these details for other financial fraud. Businesses will face huge fines because of non-compliance with PCI-DSS and it is also a death knell to your business as customers will never trust you with their credit card information.

Start a Price War:   Leverage bots to crawl the website and scrape critical information such as price and quantity from the website. Then use that data to cause inventory stock-outs or price wars by undercutting the price. While hackers might not do this directly, your competitors could be employing someone who can carry out these tactics.

Although any company could be attacked, the larger and more successful ones are hit the most. In just 2023 alone there have been numerous breaches within some of the world’s largest companies including ABBCapita and many others.

Managing Director Ian Reynolds of SecureTeam emphasises the importance of being cyber-aware whilst running an online business: “Hackers look out for businesses that have vulnerable security systems. These might range from accounts with weak passwords, a lack of two-factor authentication, inadequate security systems. They may also look to target newer or more junior staff, who could be easier to phish... There are several key ways businesses can protect themselves from cyber-attacks. These include training all employees thoroughly and keeping all security software up-to-date."

Failing to achieve these basic security measures is one of the leading causes of cyber attacks. Whilst there is no 100% secure or safe way for business protection, these tips and ensuring all software is up-to-date, as well as staff training could help reduce the risk of a cyber attack.

You Might Also Read: 

How Can We Realise Cyber Resilience Through Education?:

____________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« How To Counter Covert Action In The Digital Age
The Limitations of AI »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

UpGuard

UpGuard

UpGuard's discovery engine brings visibility to complex IT environments, enabling teams to identify risk, confirm compliance and make business safer.

Netwrix

Netwrix

Netwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach.

Lepide

Lepide

LepideAuditor is a powerful Data Security Platform that enables you to reduce risk, prevent data breaches and prove regulatory compliance.

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute at Northern Michigan University offers non-degree and industry credentials relevant to emerging careers in cybersecurity.

e360

e360

e360 (formerly Entisys360) is an award-winning IT consultancy specializing in advanced IT infrastructure, virtualization, security, automation and cloud first solutions.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.

Software Diversified Services (SDS)

Software Diversified Services (SDS)

SDS provides the highest quality mainframe software and award-winning, expert service with an emphasis on security, encryption, monitoring, and data compression.

Integrity

Integrity

Integrity is a PCI QSA and ISO 27001 certified company specialized in Information Security and IT Consulting.

Content+Cloud

Content+Cloud

Content+Cloud is a leading technology services business and Managed Services Provider (MSP) with a genuine passion for helping your organisation to succeed, whatever your ambitions.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

CerraCap Ventures

CerraCap Ventures

CerraCap Ventures invest globally into early-stage B2B companies in Healthcare, Enterprise AI and Cyber Security.

QAlified

QAlified

QAlified offer independent testing and quality assurance services for software projects including security testing.

OpsHelm

OpsHelm

OpsHelm provides a Software-as-a-Service solution to help businesses ensure that all of their cloud environments have their security bases covered.

InnovateHer

InnovateHer

At InnovateHer, our vision is to make the tech sector more equitable, by increasing diversity across the spectrum and creating more inclusive workplaces.

JustunSecure

JustunSecure

JustunSecure is dedicated to promoting information technology and cybersecurity in Africa.

Andesite

Andesite

Andesite is delivering sustained advantage to cyber defense teams through technology and community.