Syntax IT Services | 6 Angles Cyber Criminals Exploit
Syntax IT Services provide expert remote, onsite and proactive support as well as project management for everything from a server installation to a hardware refresh or even office move and cabling. We are a leading Software Development company in the UK for Desktop, Web applications and Mobile app development, testing, support and cloud hosting. Call us today: 0844 264 1310
Derby, Nottingham, Derbyshire, Northamptonshire, Nottinghamshire, Rutland, Leicestershire, East, West, Midlands, SMB, Small, Medium, Business, Flexible, Managed, Hosted, Remote, Onsite, Private, Office, Anti Virus, Spam, Backup, Back Up, DR, Disaster Recovery, Proactive, IT, Security, Cloud, Project, Software, Application, Exchange, Asset, Mobile, Device, Hardware, Server, Cabling, Domain, Support, Analysis, Audit Management, Refresh, Migration, Hosting, Development, Services, Installation, Syntax, Datashield, Data Shield, Mailminder, Mail minder, Crown Commercial Services,
16814
post-template-default,single,single-post,postid-16814,single-format-standard,ajax_fade,page_not_loaded,,qode-theme-ver-13.9,qode-theme-bridge,wpb-js-composer js-comp-ver-5.4.7,vc_responsive

 

Think Like a Cybercriminal

As long as businesses continue to operate and make money, cybercriminals will look for ways to break in, exploit weaknesses and steal. To defeat them, you need to think like a cybercriminal to find the angles they could use to exploit your systems.

6 Angles Cybercriminals Exploit

1    STOLEN DEVICES

The Threat

Hackers stealing sensitive data

80

% of the cost of a stolen laptop is from stolen data

The Fix

Encrypt all devices and use an asset-tracking tool to keep inventory

2    POOR USER AWARENESS

The Threat

Weak passwords and phishing scams

85

% of organizations have experienced a phishing attack

The Fix

Provide user awareness training

3    OUT-OF-DATE ANTIVIRUS

The Threat

New malware strains come online daily

390000

new malware strains created each day

The Fix

Update virus definitions and leverage behavioral and heuristic scans

4    UNPATCHED SOFTWARE

The Threat

Out-of-date software can be susceptible to automated attacks

25

% of Microsoft Windows users run the latest, fully patched version

The Fix

Use a patch management tool to keep up

5    MALICIOUS SOFTWARE

The Threat

Drive-by downloads or phishing websites to steal credentials

195000

unique domains were used for phishing attacks in 2016

The Fix

Deploy a web content-filtering solution to keep users off malicious websites

6    LACK OF MONITORING

The Threat

Attacks often go unnoticed

205

days is the average time it takes for organizations to discover an intrusion

The Fix

Use a strong monitoring system to detect unauthorized access

Cybercriminals are continually developing new ways to exploit our businesses and therefore we cannot afford to become complacent and consider that all bases are covered.

By actively participating and contributing to the wider security community and by collaborating with leading Cyber Security authorities Syntax IT Services are perfectly placed to support existing and new customers alike.

Become Cyber Essentials Certified

Certificate no. 5943049663566681

Want to understand how Syntax IT Services can support the ever changing Cyber security needs of your business? Call us today
Footnotes:
  1. Mobile Device Security: Startling Statistics on Data Loss and Data Breaches, ChannelPro Network. http://breachlevelindex.com/assets/Breach-Level-Index-Report-2016-Gemalto.pdf (accessed July 2017).
  2. Phishing by the Numbers: Must-Know Phishing Statistics, 2016, Barkly. https://blog.barkly.com/phishing-statistics-2016 (accessed July 2017).
  3.  https://www.av-test.org/en/statistics/malware/ (accessed July 2017).
  4. The 2016 Duo Trusted Access Report, Duo Security. https://duo.com/assets/ebooks/duo-trusted-access-report.pdf (accessed July 2017).
  5. Domain Use and Trends, APWG. https://apwg.org//resources/apwg-reports/domain-use-and-trends (accessed July 2017).
  6. M-Trends 2015: A View from the Front Lines, Mandiant. https://www2.fireeye.com/WEB-2015-MNDT-RPT-M-Trends-2015_LP.html (accessed July 2017).