Cyberattacks come in all shapes and sizes.
This module will teach you why they happen and how to respond to them.
But what is valuable to attackers?
Credit Card Numbers, Crypto Currency data or Bank Account Information are the most obvious targets.
Source Code, Blueprints and other proprietary information can be very valuable to a business's competitors.
Any information that allows attackers to predict the future performance of a company can be abused for insider trading on the stock markets.
Caused by simple attacks like defacing a website...
...or the leaking of customer information.
Encrypting files on compromised systems allows attackers to demand ransoms from affected organizations to restore their data.
In short, cyber criminals aim to either acquire or destroy value in the form of money, information or reputation.
Many employees and managers make the mistake of thinking that the various security or IT teams are solely responsible for protecting the organization from attacks.
However, the work of all staff is required to keep an organization secure.
Some users are the weakest or least secure links in IT systems.
Attackers know this. Therefore, most common cyber attacks target people rather than computers.
In 7 easy steps.
Always exercise caution. Never trust something just because it seems to come from someone you know. Never take risks in the office while counting on the IT team or antivirus software to protect you.
If you are unsure about something, ask the IT or security team. If you see suspicious behavior or scams, report them. These specialized teams rely on you for this critical information. Always lean on the side of safety.
Clicking on a malicious file or making a coding mistake is always scary. Your first impulse may be to hush it up. However, please do not do so.
IT Security teams can only defend against threats they know about. The sooner they know, the faster they can stop an attack.
You are unlikely to be punished for making mistakes. However, hiding security mistakes that then lead to damage to the organization is likely to have severe consequences.
When your computer starts behaving oddly, shut it down immediately.
For laptops, press and hold the power button for several seconds until the machine turns completely off.
For desktop computers, unplug the power cable.
Network cards may draw power from the network cable, so you should also disconnect them.
Patches and updates can be bothersome and interrupt your workflow. This is especially true for updates that require rebooting your computer.
However, it is still critical that you apply patches as soon as they are released to keep your computer safe.
Antivirus software works by comparing files to known instances of malware.
This is why it is critical that you keep your antivirus definitions updated. Without current virus definitions, there is nothing your antivirus software can do to protect you against recent malware.
Luckily, this process is automatic with most antivirus software.
Emails are one of the most common reasons for accidental data leaks. It is therefore important that you exercise caution when sending them.
Always double-check the recipients and everyone included in the CC and BCC before sending an email.
Never send confidential files over email without encrypting them first.
Always double check that the file you have attached is the correct one by opening it after it has been attached.