Click me
Transcribed

4 stages of an attack

THE 4 STAGES HOW HACKERS TARGET SMALLER BUSINESSES MORE CYBER CRIMINALS FREQUENTLY THAN LARGE ENTERPRISES, BELIEVING SMBS OF A CYBER ATTACK DON'T HAVE ENOUGH SECURITY IN PLACE. THEY WANT TO STEAL CUSTOMER IDENTITIES, COMMIT BANK FRAUD OR ARE TARGETING SMALL AND FORCE YOU TO PURCHASE FAKE ANTIVIRUS SOFTWARE. UNDERSTANDING THE WAY AN ATTACK BEHAVES WILL HELP MEDIUM-SIZED BUSINESSES YOU STAY SAFE FROM CYBERCRIME. 2) RISKY BREAKING SETTING UP DEVIOUS ENCOUNTERS IN SHOP ACTIVITY Attackers frequently make contact when an employee In particularly weak or unprotected systems, malware slips past Once on your system, The bad software the bad software exports passwords, logs keystrokes, steals Social Security and credit card numbers, visits a bad website or clicks hides from outdated on a link in an email and unknowingly downloads antivirus software vigilant users through gaps in software that hasn't been kept up-to-date to save itself and may even block your machines' ability to update security malware. Wireless connections or snoops into your business plans or and thumb drives are other entry points. to your computer. software. product ideas. Hackers also make TYPICAL SNEAKY PHISHING ATTACKS: HOW HACKERS ATTACK Your computer can even be contact through turned into a "bot" and be used ATM "skimmers" installed A hacker sends a consumer an email that Banking Trojans, malicious to distribute spam and malware programs, create backdoors that allow hackers remote access to inside ATMS and to your customers. appears to be from a reputable company. Links in the email take you to a fake website where you're asked to type in personal information. point-of-sale devices. your computer and data. Cybercrooks are stealing as much as $1 billion a year from small CYBER ATTACKS BY THE NUMBERS www Criminal websites are on the rise. From April 2 You open a phishing email and a keystroke and mid-sized bank accounts. "Ransomware" locks your program is quietly loaded on your computer screen (often with a fake law enforcement message) to June of 2013 alone, 3/4 of attacks that allows hackers to later record your the number of passwords or credit card numbers. so you can't use the computer again unless you pay the ransom. Typically, even if you pay, the hacker won't release the PC. are driven by financial motives. websites “infected" Malware can change browser security with viruses or other settings, or disable Windows Task Manager, Windows Safe Mode, System Restore, your firewall and even Microsoft Security Center. criminal software Phishers commandeer a reputable website and 3 redirect customers to a replicated site that is increased 16% to 75 million. used to steal customer information. WHAT YOU CAN DO Get the latest security software to protect Maintain operating Allow Toss anything Use a Protect your Have a cyber security plan that protects Tell Only keep customers the sensitive automated that looks smart phones, systems, applications and Web browsers, spam what data you need updates for filter. tablets and sensitive information. suspicious, including emails, tweets, your company's Web, information and delete the email and devices. programs gaming systems Create Web and social rest. Back up you collect and how applying patches as soon as they seeking to update their media use policies for employees and make sure they follow them.. Find your perfect security from viruses wWw critical solution at: posts and online ads. and destructive you use it. information. http://www.mcafee.com/smb become available. defenses. software. Sources: McAfee Quarterly Threats Report 2013 2013 Verizon Data Breach Investigations Report M McAfee Department of Homeland Security: National Cyber security Awareness Campaign http://www.google.ca/url?sa=t&rct=j&q=&source%3web&cd=1&ved%3DOCCWQFJAA&url=http%3A%2F%2Fwww.dhs.gov%2Fsites%2Fdefault%2Ffiles%2Fpublications%2FSmall%2520Business%2520Presentation_1.pdf&ei=L7YsUpbhAeKaiQK8toDICw&usg=AFQjCNEnqKqmQJweP-J99PL4BS9I-ZplKw&bvm=bv.51773540,d.cGE&cad3rja 2012 National Cyber Security Association/McAfee Online Safety Survey The Technology Policy Division of the Financial Services Roundtable, Malware Risks and Mitigation Report, www.bits.org An Intel Company National Cyber Security Alliance (NCSA), http://www.staysafeonline.org/business-safe-online/resources/botnet-fact-sheet Federal Communication Commission Cyber Security Planning Guide http://www.bloomberg.com/news/2011-08-04/hackers-take-1-billion-a-year-from-company-accounts-banks-won-t-indemnify.html 2012 National Cyber Security Association/VISA National Small Business Study 4+ 123-456-00

4 stages of an attack

shared by visually on Jul 17
770 views
1 shares
0 comments
Anatomy of an attack McAfee Labs team has found that the majority of cyber attacks follow four distinct phases“ along with a pre-attack phase. Examining and understanding these stages of attack pro...

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size