SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
Hackers and Hacking												
besafeonline
From spear phishing to social engineering and Trojan horses - the ways in which a
computer or network can be hacked have some rather obscure and technical names.
But what do these dramatic-sounding threats really mean to a small business, and how
likely are they to occur?
Look out!
Be Safe Online Hackers and Hacking www.avg.com	2
T
he Internet is growing at
a staggering rate. Devices
proliferate, user numbers
continue to surge and the means of
connecting devices, data, applications
with the users grow ever more complex.
With accelerating levels of technological
integration comes the opportunity to
live and work in new and exciting ways.
But with that change come certain
risks. The more means we have to be
connected, the more devices we use,
the more windows of opportunity there
are for hackers.
Many small businesses assume a
hacker won’t be interested in their
data, misguidedly believing that they’d
be more interested in hacking larger
corporations.
Sadly, the evidence shows otherwise.
Hackers target 30,000 SMB websites
per day to spread malware. So what can
businesses do to prevent those attacks
or at least lessen their impact?
The answers are simpler than you might
think. Surprisingly, the number one
solution to reduce the chance of being
hacked is to use a strong password!
But that’s not all, there are plenty more
protective measures that you and your
business can undertake...
IntroductionThe first step in tackling a threat is to understand it. This guide will demystify
global hacking phenomena and explain how local and small businesses can inform
and prepare themselves.
Mike Foreman is a small
business enthusiast, an
ex-IT reseller and AVG’s
General Manager of SMB.
He blogs about topical
SMB issues at http://
blogs.avg.com
A
nonymity is the primary modus
operandi, no matter what the
nationality of the hacker. Hackers
in, say, Brazil, can anonymously run
phishing operations targeting web
users in Spain, the UK and the US as
well as targeting their compatriots.
And they have done so. Cybercrime is
so hard to police because of this lack of
geographical restriction.
Whatever else can be said about them,
hackers are highly skilled and technically
competent people to say the least -
don’t be fooled by the “geek” label; the
vast majority of web users would not
have the slightest idea how to hack
into, say, NASA or even a standard
e-commerce system. And while hackers
have many and varied reasons for doing
what they do, it’s not quite so hard to
understand who they target and why.
Larger corporates have more financial
resource to invest in defences. Hackers
are well aware of this. They then
logically target the weaker links in the
chain - the suppliers, so often an SMB.
The data that these SMB suppliers
process is often extremely valuable,
both to the SMB and to the client they
are supplying. Hackers know this too.
Anonymously, and from international
bases, hackers produce programs and
software designed to scour the web
hunting for those weak links, wherever
they may be.
Hackers don’t just want purely financial
information, personal profiling data is
highly valuable to them as is corporate
data relating to new product research
and development.
Who are they?Hackers are mysterious and secretive and their motivations vary. Just as the
Internet has opened up new frontiers for trade, so have hackers from all corners
of the globe found ways to identify new international targets.
Be Safe Online Hackers and Hacking www.avg.com 	 3
Don’t be fooled by the
“geek” label
W
hat is not so clear is why
businesses are still leaving
their keys in the ignition. For
example, the most popular password
in 2012 was Password! Likewise, when
a business owner has a mentality of
“I’m a small business, hackers won’t be
interested in me” they may not bother
with higher levels of security. They are
therefore letting their guard down on at
least two counts, in terms of personal
protection and that of the network.
It doesn’t take long to find a site or
network with poor security either. Hackers
don’t spend days or weeks trawling the
Internet looking for sites to hack, they
create code to do that for them which
ceaselessly scans for weaknesses, flaws
and open doors.
A single hack may only result in a few
hundred sets of credit card details, but
that profiling data is still highly desirable
because of its value on the black market.
Even if the hacker doesn’t sell or share
the data directly, they can use it to set up
other accounts online and create false or
duplicate identities based on real people
- your customers - in order to commit
fraud, other crimes or more simplistic
disruptive activities.
69% of
breaches were
discovered
by external
parties
***
All too easyThe evidence is clear. Regardless of company size and regardless of the hacker’s
objective, the main reason so many smaller businesses are still hacked so easily
is because of the low level security measures they have mistakenly in place. An
attitude shift is required.
Be Safe Online Hackers and Hacking www.avg.com 	 4
of breaches took
months or
more to discover **
30,000 SMB websites hacked every day *
the time it takes
to hack a six-digit
password of 6
lowercase letters **
10mins
Sources: http://www.forbes.com/sites/jameslyne/2013/09/06/30000-web-sites-hacked-a-day-how-do-you-host-yours * http://www.verizonenterprise.com/DBIR/2013 ***
66%
http://www.onlinecollegecourses.com/hacked **
Be on guard
Be Safe Online Hackers and Hacking www.avg.com 	 5
Cross-site Forgery
This is where a hacker tricks a legitimate user into giving out
access details, usually by email or sending http requests, that
will then enable them to exploit the computer or system e.g.
modify firewall settings, post unauthorized data on a forum,
or carry out fraudulent transactions.
Social Engineering
This is where a hacker attempts to gain the confidence of
an authorized user of your website or business systems and
gets them to reveal information that will enable them to
later compromise its security. They might reach out to your
employees on social media in and out of working hours or
hang around a coffee shop near the office and strike up a
leading conversation.
Phishing / Spear Phishing
Hackers will send you an official-looking email purporting to
be from one of the sites or apps you might use e.g. PayPal. Or,
it may appear to come from one of your own employees who
occupies a position of high authority. In the email they will
ask you to click on a link or reply to it with a certain piece of
sensitive information.
Drive-by Downloads
This is where a person visits a web page and a piece of
malware is downloaded without their knowledge or even
deliberately clicking anything. That malware may then allow
other types of hacking to take place.
Malware, Trojan Horses, Viruses, Worms, Spyware
These programs contain malicious code, sometimes hidden
inside another apparently harmless looking program. When
activated, they gain control of your computer and can delete
or amend files, secretly capture your login details for other
websites, or conduct other disruptive activities without you
being aware.
SQL Injection
This is where the hacker adds Structured Query Language
(SQL) code to a web form input box which then gives them
access to your resources or the ability to make changes to
the data in your systems. This kind of hack can go undetected
and, in certain cases, seriously affect your search rankings.
There are many ways to hack into a website or network - and it won’t always be
obvious that an attack has happened - but the most common forms of attack to look
out for include:
Y
ou may not store any customer
credit card details on your server,
but your website can still be
defaced or taken offline for other reasons.
If that happens it could:
● Stop orders coming through.
● Cause a loss of customer 	 	
confidence in your site’s security, 	
brand or reputation.
● Cause customers to log on to a 	
competitor’s site.
An emerging trend in the security
industry is to think of your business as
being in a constant state of compromise
and flux.
This isn’t as pessimistic or alarming as
it sounds. It’s actually more a pragmatic
and realistically-minded recognition
that, rather than trying to predict and
defend against all possible attacks at
all possible times (which is extremely
resource intensive and costly), it is
better to accept that a certain amount
of compromise is always likely.
With that in mind, you can then
maximise and allocate whatever
resources are available in tackling the
most virulent and prevalent attacks.
This represents a constructive and
helpful shift in attitude. It doesn’t mean
that small businesses accept defeat or
ignore the risks; it means you accept
that you can’t always foresee every
attack and instead you take steps to
minimise the related impact.
In a short amount of time, by carrying
out a few straight forward measures
coupled with some fine-tuning, you can
easily raise your level of security against
the most common threats without it
costing your business the earth. Take
your time to consider them.
Risk analysisCapturing, storing and transmitting data through your business systems
is a risk you can’t avoid. But it is a risk you can manage. The greater risk is
assuming you won’t be a target because you think your business has nothing
to offer a hacker.
Be Safe Online Hackers and Hacking www.avg.com 	 6
T
he first thing you and your staff
can do is to use strong password
creation processes.
The second important means of defense
is to keep your passwords strong! You
can put your business in a good position
do this by:
● Limiting how many people have 	
access to your systems.
● Changing your passwords regularly,
at least once a month is good.
● Not using the same password for 	
multiple accounts.
● Not writing down your passwords 	
and leaving them near your PC for 	
‘frenemies’ to find and misuse.
Check Yourself!
Defeating or deterring the hackers
doesn’t stop at strong passwords.
These simple checks will help ensure
your IT security is in good shape:
Check your Firewall and AntiVirus
Are they both up to date? Are the right
settings applied? Do this for every
device in your network. Leave nothing
out of date and no stone unturned.
Check your Backups
Running a daily backup means you can
restore everything to a recent point in
the past, limiting the loss and helping
you recover as quickly as possible if you
are hacked.
Check your Code
Assuming you do not have the
appropriate internal resources, invite
an IT professional to scan your systems
and perform a penetration test to
confirm that the coding and hosting of
your website is both robust and free of
common errors.
You may need to invest in an SSL
certificate too but this isn’t expensive.
Protective stepsThe best security policies start with the individual. If every staff member is
well drilled in the subject of protective steps and security measures, the chain
is immediately reinforced at every link.
Be Safe Online Hackers and Hacking www.avg.com 	 7
A strong password consists of
a mix of the following:
● Uppercase letters: F X W
● Lowercase letters: k g m
● Numbers: 7 4 9 0
● Symbols: @ & ! $
● At least 8 characters
Focus
At this point you need to quickly
understand what has happened, the
impact it is having, the consequences,
and how to fix it. This is not the time
to go looking for a scapegoat, it is time
for careful and considered action.
Be cautious
Don’t dive in straight away and try to
fix it yourself because you might make
things worse, or disturb important
evidence. Only fix it if you are
absolutely certain you have the skills,
tools, knowledge and authority.
Call in an expert
Yes it might cost you, but think of how
much more it could cost if you cannot
fix things quickly or in the right way:
a loss of sales, reputation, or of loyal
customers. Can you afford that?
Tell your customers
When you know what happened and
how it affects your customers, tell
them. Be open, upfront and honest.
Your reputation is just as important
as your sales. Ask them to change
their password if they have an online
account with you.
Upgrade and update
If you were hacked because of
outdated software or hardware then
this is the time to invest in equipment
better suited to today’s threats.
Stay vigilant
Keep an eye open for news about the
latest hacks, even if they happened to
a large company or government. The
same flaw may exist in your software,
hardware, website or network. Find out
what the cause was and figure out if it
applies to you. If you’re not sure, call in
an expert.
But what if...
Be Safe Online Hackers and Hacking www.avg.com 	 8
If you are unlucky enough to be hacked, knowing how to respond and what steps
to take first could make all the difference. It proves to your customers that you
are taking the problem seriously and reacting to their concerns and needs.
How secure is your
business? Click on the
image above to use our
SMB health check (see
back page for full URL).
Go ahead
Hackers want what you don’t want them to have and will continue to look for
ways to get hold of it. Whose will is the stronger and whose technology
will falter first?
You don’t have to leave it to chance, you can improve your security and
protect your business.
Learn more about internet security at www.avg.com/business-security
* Small Business IT Security Health Check
www.avg.com/small-business-it-security-healthcheck

Más contenido relacionado

Destacado

3 pend1
3 pend13 pend1
3 pend1HARLAN
 
Case Study City Of Brentwood
Case Study City Of BrentwoodCase Study City Of Brentwood
Case Study City Of BrentwoodAVG Technologies
 
JC2 Be A Mastermind
JC2  Be A MastermindJC2  Be A Mastermind
JC2 Be A Mastermindmjc.chrystal
 
층류 익형의 설계 최적화
층류 익형의 설계 최적화층류 익형의 설계 최적화
층류 익형의 설계 최적화HyunJoon Kim
 
Conservation District
Conservation DistrictConservation District
Conservation Districtvance123
 
Avg SMB Cloud Computing Guide 2011
Avg SMB Cloud Computing Guide 2011Avg SMB Cloud Computing Guide 2011
Avg SMB Cloud Computing Guide 2011AVG Technologies
 
intervuista Polis Parizzi
intervuista  Polis  Parizziintervuista  Polis  Parizzi
intervuista Polis Parizzifidentino
 
Ограждающие конструкции МЕТТЭМ
Ограждающие конструкции МЕТТЭМОграждающие конструкции МЕТТЭМ
Ограждающие конструкции МЕТТЭМAvalon
 
Thank you for the greetings
Thank you for the greetingsThank you for the greetings
Thank you for the greetingsMartins Falokun
 
Проект строительства отеля в Турции
Проект строительства отеля в ТурцииПроект строительства отеля в Турции
Проект строительства отеля в ТурцииAvalon
 
Titulados total 2007
Titulados total 2007Titulados total 2007
Titulados total 2007SIES DIVESUP
 
Las rutas de la violencia
Las rutas de la violenciaLas rutas de la violencia
Las rutas de la violenciaewilliamz
 

Destacado (17)

3 pend1
3 pend13 pend1
3 pend1
 
Case Study City Of Brentwood
Case Study City Of BrentwoodCase Study City Of Brentwood
Case Study City Of Brentwood
 
JC2 Be A Mastermind
JC2  Be A MastermindJC2  Be A Mastermind
JC2 Be A Mastermind
 
층류 익형의 설계 최적화
층류 익형의 설계 최적화층류 익형의 설계 최적화
층류 익형의 설계 최적화
 
Conservation District
Conservation DistrictConservation District
Conservation District
 
Avg SMB Cloud Computing Guide 2011
Avg SMB Cloud Computing Guide 2011Avg SMB Cloud Computing Guide 2011
Avg SMB Cloud Computing Guide 2011
 
Bible Triva Game
Bible Triva GameBible Triva Game
Bible Triva Game
 
intervuista Polis Parizzi
intervuista  Polis  Parizziintervuista  Polis  Parizzi
intervuista Polis Parizzi
 
Ограждающие конструкции МЕТТЭМ
Ограждающие конструкции МЕТТЭМОграждающие конструкции МЕТТЭМ
Ограждающие конструкции МЕТТЭМ
 
Thank you for the greetings
Thank you for the greetingsThank you for the greetings
Thank you for the greetings
 
Проект строительства отеля в Турции
Проект строительства отеля в ТурцииПроект строительства отеля в Турции
Проект строительства отеля в Турции
 
Titulados total 2007
Titulados total 2007Titulados total 2007
Titulados total 2007
 
Eccentricity Practice Problems HW
Eccentricity Practice Problems HWEccentricity Practice Problems HW
Eccentricity Practice Problems HW
 
Me Without You
Me Without YouMe Without You
Me Without You
 
Graphing Worksheet
Graphing WorksheetGraphing Worksheet
Graphing Worksheet
 
Profile2014
Profile2014Profile2014
Profile2014
 
Las rutas de la violencia
Las rutas de la violenciaLas rutas de la violencia
Las rutas de la violencia
 

Más de AVG Technologies

Android performance optimization_guide_h1 2016
Android performance optimization_guide_h1 2016Android performance optimization_guide_h1 2016
Android performance optimization_guide_h1 2016AVG Technologies
 
Avg technologies android app_performance__trends_report_h1 2016
Avg technologies android app_performance__trends_report_h1 2016Avg technologies android app_performance__trends_report_h1 2016
Avg technologies android app_performance__trends_report_h1 2016AVG Technologies
 
AVG Android App Report Q3 2015
AVG Android App Report Q3 2015AVG Android App Report Q3 2015
AVG Android App Report Q3 2015AVG Technologies
 
Weather Forecast for Today? Advert Flood Coming from East
Weather Forecast for Today? Advert Flood Coming from EastWeather Forecast for Today? Advert Flood Coming from East
Weather Forecast for Today? Advert Flood Coming from EastAVG Technologies
 
AVG Android App Performance Report Q1 2015
AVG Android App Performance Report Q1 2015AVG Android App Performance Report Q1 2015
AVG Android App Performance Report Q1 2015AVG Technologies
 
AVG Managed Workplace 9.1 Fact Sheet
AVG Managed Workplace 9.1 Fact SheetAVG Managed Workplace 9.1 Fact Sheet
AVG Managed Workplace 9.1 Fact SheetAVG Technologies
 
Avg Technologies Vawtrak Banking Trojan White Paper
Avg Technologies Vawtrak Banking Trojan White PaperAvg Technologies Vawtrak Banking Trojan White Paper
Avg Technologies Vawtrak Banking Trojan White PaperAVG Technologies
 
AVG Android App Performance Report Q4 2014
AVG Android App Performance Report Q4 2014AVG Android App Performance Report Q4 2014
AVG Android App Performance Report Q4 2014AVG Technologies
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust ReportAVG Technologies
 
AVG Android App Performance Report by AVG Technologies
AVG Android App Performance Report by AVG TechnologiesAVG Android App Performance Report by AVG Technologies
AVG Android App Performance Report by AVG TechnologiesAVG Technologies
 
AVG Protection Reviewer's Guide 2015
AVG Protection Reviewer's Guide 2015AVG Protection Reviewer's Guide 2015
AVG Protection Reviewer's Guide 2015AVG Technologies
 
Tony Anscombe CIS Keynote 2014
Tony Anscombe CIS Keynote 2014Tony Anscombe CIS Keynote 2014
Tony Anscombe CIS Keynote 2014AVG Technologies
 
AVG CIS 2014 Resource Sheet
AVG CIS 2014 Resource SheetAVG CIS 2014 Resource Sheet
AVG CIS 2014 Resource SheetAVG Technologies
 
Tony Anscombe Seminar CIS 2014
Tony Anscombe Seminar CIS 2014Tony Anscombe Seminar CIS 2014
Tony Anscombe Seminar CIS 2014AVG Technologies
 
Yuval Ben-Itzhak Seminar CIS 2014
Yuval Ben-Itzhak Seminar CIS 2014Yuval Ben-Itzhak Seminar CIS 2014
Yuval Ben-Itzhak Seminar CIS 2014AVG Technologies
 
AVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG Technologies
 
AVG Internet of Things Survey Oct 2014
AVG Internet of Things Survey Oct 2014AVG Internet of Things Survey Oct 2014
AVG Internet of Things Survey Oct 2014AVG Technologies
 
AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015AVG Technologies
 
AVG Cleaner for Mac Whitepaper 2015
AVG Cleaner for Mac Whitepaper 2015AVG Cleaner for Mac Whitepaper 2015
AVG Cleaner for Mac Whitepaper 2015AVG Technologies
 
AVG Cleaner for iPhone and iPad Whitepaper 2015
AVG Cleaner for iPhone and iPad Whitepaper 2015AVG Cleaner for iPhone and iPad Whitepaper 2015
AVG Cleaner for iPhone and iPad Whitepaper 2015AVG Technologies
 

Más de AVG Technologies (20)

Android performance optimization_guide_h1 2016
Android performance optimization_guide_h1 2016Android performance optimization_guide_h1 2016
Android performance optimization_guide_h1 2016
 
Avg technologies android app_performance__trends_report_h1 2016
Avg technologies android app_performance__trends_report_h1 2016Avg technologies android app_performance__trends_report_h1 2016
Avg technologies android app_performance__trends_report_h1 2016
 
AVG Android App Report Q3 2015
AVG Android App Report Q3 2015AVG Android App Report Q3 2015
AVG Android App Report Q3 2015
 
Weather Forecast for Today? Advert Flood Coming from East
Weather Forecast for Today? Advert Flood Coming from EastWeather Forecast for Today? Advert Flood Coming from East
Weather Forecast for Today? Advert Flood Coming from East
 
AVG Android App Performance Report Q1 2015
AVG Android App Performance Report Q1 2015AVG Android App Performance Report Q1 2015
AVG Android App Performance Report Q1 2015
 
AVG Managed Workplace 9.1 Fact Sheet
AVG Managed Workplace 9.1 Fact SheetAVG Managed Workplace 9.1 Fact Sheet
AVG Managed Workplace 9.1 Fact Sheet
 
Avg Technologies Vawtrak Banking Trojan White Paper
Avg Technologies Vawtrak Banking Trojan White PaperAvg Technologies Vawtrak Banking Trojan White Paper
Avg Technologies Vawtrak Banking Trojan White Paper
 
AVG Android App Performance Report Q4 2014
AVG Android App Performance Report Q4 2014AVG Android App Performance Report Q4 2014
AVG Android App Performance Report Q4 2014
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust Report
 
AVG Android App Performance Report by AVG Technologies
AVG Android App Performance Report by AVG TechnologiesAVG Android App Performance Report by AVG Technologies
AVG Android App Performance Report by AVG Technologies
 
AVG Protection Reviewer's Guide 2015
AVG Protection Reviewer's Guide 2015AVG Protection Reviewer's Guide 2015
AVG Protection Reviewer's Guide 2015
 
Tony Anscombe CIS Keynote 2014
Tony Anscombe CIS Keynote 2014Tony Anscombe CIS Keynote 2014
Tony Anscombe CIS Keynote 2014
 
AVG CIS 2014 Resource Sheet
AVG CIS 2014 Resource SheetAVG CIS 2014 Resource Sheet
AVG CIS 2014 Resource Sheet
 
Tony Anscombe Seminar CIS 2014
Tony Anscombe Seminar CIS 2014Tony Anscombe Seminar CIS 2014
Tony Anscombe Seminar CIS 2014
 
Yuval Ben-Itzhak Seminar CIS 2014
Yuval Ben-Itzhak Seminar CIS 2014Yuval Ben-Itzhak Seminar CIS 2014
Yuval Ben-Itzhak Seminar CIS 2014
 
AVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact Sheet
 
AVG Internet of Things Survey Oct 2014
AVG Internet of Things Survey Oct 2014AVG Internet of Things Survey Oct 2014
AVG Internet of Things Survey Oct 2014
 
AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015
 
AVG Cleaner for Mac Whitepaper 2015
AVG Cleaner for Mac Whitepaper 2015AVG Cleaner for Mac Whitepaper 2015
AVG Cleaner for Mac Whitepaper 2015
 
AVG Cleaner for iPhone and iPad Whitepaper 2015
AVG Cleaner for iPhone and iPad Whitepaper 2015AVG Cleaner for iPhone and iPad Whitepaper 2015
AVG Cleaner for iPhone and iPad Whitepaper 2015
 

Último

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 

Último (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

AVG Hackers and Hacking eBook

  • 2. From spear phishing to social engineering and Trojan horses - the ways in which a computer or network can be hacked have some rather obscure and technical names. But what do these dramatic-sounding threats really mean to a small business, and how likely are they to occur? Look out!
  • 3. Be Safe Online Hackers and Hacking www.avg.com 2 T he Internet is growing at a staggering rate. Devices proliferate, user numbers continue to surge and the means of connecting devices, data, applications with the users grow ever more complex. With accelerating levels of technological integration comes the opportunity to live and work in new and exciting ways. But with that change come certain risks. The more means we have to be connected, the more devices we use, the more windows of opportunity there are for hackers. Many small businesses assume a hacker won’t be interested in their data, misguidedly believing that they’d be more interested in hacking larger corporations. Sadly, the evidence shows otherwise. Hackers target 30,000 SMB websites per day to spread malware. So what can businesses do to prevent those attacks or at least lessen their impact? The answers are simpler than you might think. Surprisingly, the number one solution to reduce the chance of being hacked is to use a strong password! But that’s not all, there are plenty more protective measures that you and your business can undertake... IntroductionThe first step in tackling a threat is to understand it. This guide will demystify global hacking phenomena and explain how local and small businesses can inform and prepare themselves. Mike Foreman is a small business enthusiast, an ex-IT reseller and AVG’s General Manager of SMB. He blogs about topical SMB issues at http:// blogs.avg.com
  • 4. A nonymity is the primary modus operandi, no matter what the nationality of the hacker. Hackers in, say, Brazil, can anonymously run phishing operations targeting web users in Spain, the UK and the US as well as targeting their compatriots. And they have done so. Cybercrime is so hard to police because of this lack of geographical restriction. Whatever else can be said about them, hackers are highly skilled and technically competent people to say the least - don’t be fooled by the “geek” label; the vast majority of web users would not have the slightest idea how to hack into, say, NASA or even a standard e-commerce system. And while hackers have many and varied reasons for doing what they do, it’s not quite so hard to understand who they target and why. Larger corporates have more financial resource to invest in defences. Hackers are well aware of this. They then logically target the weaker links in the chain - the suppliers, so often an SMB. The data that these SMB suppliers process is often extremely valuable, both to the SMB and to the client they are supplying. Hackers know this too. Anonymously, and from international bases, hackers produce programs and software designed to scour the web hunting for those weak links, wherever they may be. Hackers don’t just want purely financial information, personal profiling data is highly valuable to them as is corporate data relating to new product research and development. Who are they?Hackers are mysterious and secretive and their motivations vary. Just as the Internet has opened up new frontiers for trade, so have hackers from all corners of the globe found ways to identify new international targets. Be Safe Online Hackers and Hacking www.avg.com 3 Don’t be fooled by the “geek” label
  • 5. W hat is not so clear is why businesses are still leaving their keys in the ignition. For example, the most popular password in 2012 was Password! Likewise, when a business owner has a mentality of “I’m a small business, hackers won’t be interested in me” they may not bother with higher levels of security. They are therefore letting their guard down on at least two counts, in terms of personal protection and that of the network. It doesn’t take long to find a site or network with poor security either. Hackers don’t spend days or weeks trawling the Internet looking for sites to hack, they create code to do that for them which ceaselessly scans for weaknesses, flaws and open doors. A single hack may only result in a few hundred sets of credit card details, but that profiling data is still highly desirable because of its value on the black market. Even if the hacker doesn’t sell or share the data directly, they can use it to set up other accounts online and create false or duplicate identities based on real people - your customers - in order to commit fraud, other crimes or more simplistic disruptive activities. 69% of breaches were discovered by external parties *** All too easyThe evidence is clear. Regardless of company size and regardless of the hacker’s objective, the main reason so many smaller businesses are still hacked so easily is because of the low level security measures they have mistakenly in place. An attitude shift is required. Be Safe Online Hackers and Hacking www.avg.com 4 of breaches took months or more to discover ** 30,000 SMB websites hacked every day * the time it takes to hack a six-digit password of 6 lowercase letters ** 10mins Sources: http://www.forbes.com/sites/jameslyne/2013/09/06/30000-web-sites-hacked-a-day-how-do-you-host-yours * http://www.verizonenterprise.com/DBIR/2013 *** 66% http://www.onlinecollegecourses.com/hacked **
  • 6. Be on guard Be Safe Online Hackers and Hacking www.avg.com 5 Cross-site Forgery This is where a hacker tricks a legitimate user into giving out access details, usually by email or sending http requests, that will then enable them to exploit the computer or system e.g. modify firewall settings, post unauthorized data on a forum, or carry out fraudulent transactions. Social Engineering This is where a hacker attempts to gain the confidence of an authorized user of your website or business systems and gets them to reveal information that will enable them to later compromise its security. They might reach out to your employees on social media in and out of working hours or hang around a coffee shop near the office and strike up a leading conversation. Phishing / Spear Phishing Hackers will send you an official-looking email purporting to be from one of the sites or apps you might use e.g. PayPal. Or, it may appear to come from one of your own employees who occupies a position of high authority. In the email they will ask you to click on a link or reply to it with a certain piece of sensitive information. Drive-by Downloads This is where a person visits a web page and a piece of malware is downloaded without their knowledge or even deliberately clicking anything. That malware may then allow other types of hacking to take place. Malware, Trojan Horses, Viruses, Worms, Spyware These programs contain malicious code, sometimes hidden inside another apparently harmless looking program. When activated, they gain control of your computer and can delete or amend files, secretly capture your login details for other websites, or conduct other disruptive activities without you being aware. SQL Injection This is where the hacker adds Structured Query Language (SQL) code to a web form input box which then gives them access to your resources or the ability to make changes to the data in your systems. This kind of hack can go undetected and, in certain cases, seriously affect your search rankings. There are many ways to hack into a website or network - and it won’t always be obvious that an attack has happened - but the most common forms of attack to look out for include:
  • 7. Y ou may not store any customer credit card details on your server, but your website can still be defaced or taken offline for other reasons. If that happens it could: ● Stop orders coming through. ● Cause a loss of customer confidence in your site’s security, brand or reputation. ● Cause customers to log on to a competitor’s site. An emerging trend in the security industry is to think of your business as being in a constant state of compromise and flux. This isn’t as pessimistic or alarming as it sounds. It’s actually more a pragmatic and realistically-minded recognition that, rather than trying to predict and defend against all possible attacks at all possible times (which is extremely resource intensive and costly), it is better to accept that a certain amount of compromise is always likely. With that in mind, you can then maximise and allocate whatever resources are available in tackling the most virulent and prevalent attacks. This represents a constructive and helpful shift in attitude. It doesn’t mean that small businesses accept defeat or ignore the risks; it means you accept that you can’t always foresee every attack and instead you take steps to minimise the related impact. In a short amount of time, by carrying out a few straight forward measures coupled with some fine-tuning, you can easily raise your level of security against the most common threats without it costing your business the earth. Take your time to consider them. Risk analysisCapturing, storing and transmitting data through your business systems is a risk you can’t avoid. But it is a risk you can manage. The greater risk is assuming you won’t be a target because you think your business has nothing to offer a hacker. Be Safe Online Hackers and Hacking www.avg.com 6
  • 8. T he first thing you and your staff can do is to use strong password creation processes. The second important means of defense is to keep your passwords strong! You can put your business in a good position do this by: ● Limiting how many people have access to your systems. ● Changing your passwords regularly, at least once a month is good. ● Not using the same password for multiple accounts. ● Not writing down your passwords and leaving them near your PC for ‘frenemies’ to find and misuse. Check Yourself! Defeating or deterring the hackers doesn’t stop at strong passwords. These simple checks will help ensure your IT security is in good shape: Check your Firewall and AntiVirus Are they both up to date? Are the right settings applied? Do this for every device in your network. Leave nothing out of date and no stone unturned. Check your Backups Running a daily backup means you can restore everything to a recent point in the past, limiting the loss and helping you recover as quickly as possible if you are hacked. Check your Code Assuming you do not have the appropriate internal resources, invite an IT professional to scan your systems and perform a penetration test to confirm that the coding and hosting of your website is both robust and free of common errors. You may need to invest in an SSL certificate too but this isn’t expensive. Protective stepsThe best security policies start with the individual. If every staff member is well drilled in the subject of protective steps and security measures, the chain is immediately reinforced at every link. Be Safe Online Hackers and Hacking www.avg.com 7 A strong password consists of a mix of the following: ● Uppercase letters: F X W ● Lowercase letters: k g m ● Numbers: 7 4 9 0 ● Symbols: @ & ! $ ● At least 8 characters
  • 9. Focus At this point you need to quickly understand what has happened, the impact it is having, the consequences, and how to fix it. This is not the time to go looking for a scapegoat, it is time for careful and considered action. Be cautious Don’t dive in straight away and try to fix it yourself because you might make things worse, or disturb important evidence. Only fix it if you are absolutely certain you have the skills, tools, knowledge and authority. Call in an expert Yes it might cost you, but think of how much more it could cost if you cannot fix things quickly or in the right way: a loss of sales, reputation, or of loyal customers. Can you afford that? Tell your customers When you know what happened and how it affects your customers, tell them. Be open, upfront and honest. Your reputation is just as important as your sales. Ask them to change their password if they have an online account with you. Upgrade and update If you were hacked because of outdated software or hardware then this is the time to invest in equipment better suited to today’s threats. Stay vigilant Keep an eye open for news about the latest hacks, even if they happened to a large company or government. The same flaw may exist in your software, hardware, website or network. Find out what the cause was and figure out if it applies to you. If you’re not sure, call in an expert. But what if... Be Safe Online Hackers and Hacking www.avg.com 8 If you are unlucky enough to be hacked, knowing how to respond and what steps to take first could make all the difference. It proves to your customers that you are taking the problem seriously and reacting to their concerns and needs. How secure is your business? Click on the image above to use our SMB health check (see back page for full URL).
  • 10. Go ahead Hackers want what you don’t want them to have and will continue to look for ways to get hold of it. Whose will is the stronger and whose technology will falter first? You don’t have to leave it to chance, you can improve your security and protect your business. Learn more about internet security at www.avg.com/business-security * Small Business IT Security Health Check www.avg.com/small-business-it-security-healthcheck