- GFI Digital
Cyber Security 101
When it comes to hacking into your organization's IT environment, criminals won't re-invent the wheel unless they absolutely must. Chances are they will use common types of hacking techniques known to be highly effective, such as malware, phishing, or cross-site scripting (XSS.)
Whether you're trying to make sense of the latest data breach headline in the news, or analyzing an internal breach in your own organization, it helps to understand the different ways an attacker might try to cause harm. Below we have listed the most common types of attacks seen in today's cyber world.
Designed to cause damage to a computer, server or computer network Malware does the damage after it is implanted or introduced in some way into a user's computer and can take the form of executable code, scripts, active content, and other software. Examples you should look for are an antivirus alert pop up or a malicious email attachment.
The fraudulent attempt to obtain confidential information such as usernames, passwords, & credit card details by disguising as a trustworthy entity on an e-commerce platform. Examples may include fake websites asking you to enter personal information, instant messaging, or email "spoofing" from an unknown or forged sender.
3.Cross-Site Scripting (XSS)
A type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.
If you are not currently securing your cyber environment or need to get a better grip on locking in confidential information before it is too late reach out to our Managed Network Service team today at 314.997.6300!