Businesses of all sizes face a number of cybersecurity threats, which over time, have become more sophisticated and harder to detect. As businesses become aware of certain threats, scammers and hackers change tactics, which is why it’s so important to know the latest threats. Here are some things that businesses need to be aware of when they’re going into 2020.
Everyone has had a phishing e-mail at some point, and the more you’ve seen, the easier they are to spot. You can usually tell by the broken English or strange e-mail address that they’re scams. However, spear phishing is a much more sophisticated scam that targets individuals and businesses by using very specific and personal information to convince the recipient to trust them. They may pretend to be a friend or colleague, and use information gained from social media and previous hacks to construct a convincing dialogue.
The best way to avoid being a victim of spear phishing is not to share personal information on public pages. You should also be cautious when reading your e-mails, even if they appear to come from someone you know. If you’re unsure about what they’re asking for, pick up the phone and ask them to verify. You should also update your McAfee software to scan e-mails and attachments, which can help detect malware.
Internet of Things hacks
From your smart speaker to your car, so many things are connected to the internet nowadays. This can make your life a lot easier in some respects, but the ‘Internet of Things’ can also pose security risks.
No doubt, many of your systems are connected to the internet, such as printers, CCTV, or even machinery, all of which can be vulnerable to an attack. Make sure you keep software up to date, change default passwords and follow up to date security advice to keep things safe.
Most businesses are aware of the risks of malware and ransomware, but in recent years cryptojacking has become a new weapon of choice for scammers. Cryptojacking involves installing a piece of malicious software into the computers of people who visit your website, and this software mines cryptocurrency, which is then paid to the hackers. It can be extremely annoying for website owners who end up with slow, lagging sites, and for victims of this kind of malware who end up with drained batteries and high electric bills.
Supply chain attacks
Supply chain attacks are complex and can take many forms, but in general, they refer to someone physically tampering with an electronic device in order to install malware, which later allows them to access sensitive information. For example, the well-publicized attack on Target, where malware was introduced to POS systems in over 1,800 stores, allowing for 40 million customers’ credit and debit card details to be exposed. Monitor your systems using up to date software, avoid ‘free’ software and the installation of anything unnecessary, and you can prevent some of the most common attacks.