“From identity theft and fraud
to corporate hacking attacks, cyber security has never been more important for
businesses, organizations and governments” (Ellyatt, 2015).
There are many ways in which hackers obtain one’s details.
There are many ways in which hackers obtain one’s details.
The first one is ransomware, this is a destructive new trend of malware, could lead to the ability for hackers to infiltrate systems, gather data and then wipe out the information to on systems and hard drives to cover tracks and thwart forensics.
The second one is when the
Internet of thing becomes the internet of threats,
Hackers will continue to follow the path of least resistance as more and more devices are connected to the network.
Hackers will continue to follow the path of least resistance as more and more devices are connected to the network.
The third one is social media
attacks, this happened a because of the large number of users who spend their
time in social networking regularly. This attract hackers and enable them to
steal customer data by disguise themselves.
The fourth one is the
Third-Party attacks. “Cyber criminals generally take the path of least
resistance, and they’ve learned that contractors and other third-party
providers can provide an opening into otherwise-secured corporate networks” (Bradley, 2015)
The fifth one is the Sophisticated DDoS Attacks. Here hackers
do not still information but they simple overwhelmed your one’s site so that it
keeps users from connecting.
One should be careful
whilst using the Internet. By enforcing password policy, this will keep hackers
from infiltrating in your details, one must secure his/her browsers by setting
passwords to permit accesses only to authorised users and use an effective web
security solution, this will protect one from trusted sites
that he/she visits daily that may become hijacked at any time.
No comments:
Post a Comment