5 Things You Need to Know About Network Security (but Were Embarrassed to Ask)


Let’s face it, most of us are not network gurus and while we know security is important, we tend to gloss over things we don’t fully understand…especially if they involve fast-moving technology. TCI wants to make it easier to keep up.  Here’s some of the more common techniques bad guys are using to breach your businesses every day:

  1. Phishing – Often posing as a request for data from a trusted source. This attack is launched via email and asks users to click on a link. Over time, phishing has evolved to include Spear Phishing (targeted attempts highly personalized for a specific target) and Whaling (phishing scams that target high-profile users and decision makers).
  2. Spoofing – Email spoofing is when the sender address is forged to make it appear that their email comes from a trusted source, such as your bank. The email can send you to a bogus website where your account details can be stolen. Or it appears to come from inside your own organization, asking you to change your password or confirm your details.
  3. Malware Insertion – This refers to a variety of cyber threats including Trojans, viruses and worms which typically steal data or destroy key computer functions; usually introduced through email attachments, website visits, software downloads, or operating system vulnerabilities.
  4. Ransomware – This is a specific type of malware, that requires some sort of ransom payment to either remove it or to retrieve files that had been encrypted. Ransomware has been around for a long time, but it made news this year when Cryptolocker encrypted files and then demanded payment in Bitcoin.
  5. Hijacking – A hijacking attack changes a computer’s settings to either ignore DNS or use a DNS server that is controlled by malicious hackers. The attackers then redirect communication to fraudulent sites. Website hijacking is commonly used to redirect users to fake login pages for banks and other online services in order to steal their login credentials. It can also be used to redirect security sites to non-existent servers to prevent affected users from updating their security software.

IT security is a big challenge. TCI experts can help.

Contact us today at (703) 321-3030 or info@tcicomm.com

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published.