Common cyber-attacks and how to prevent them...

Common cyber-attacks and how to prevent them...

Cyber-attacks can be a regular occurrence in business. Every business has something of value to a cybercriminal, but not everybody understands common cyber-attacks. Let’s look at common stages that cyber-attacks follow and how to prevent them at each stage.

Every organisation is a potential victim

While it’s impossible to say if you will suffer from a cyber-attack. One thing we can say is that every organisation has something of value to a cybercriminal. Most companies want concrete information about when and how they will get attacked before they invest in cybersecurity defences. It’s complicated to give an accurate assessment when it comes to cyber-attacks.

If you openly demonstrate weaknesses in your approach to cybersecurity by failing to do the basics, you will experience some form of cyber-attack. It’s as simple as this. Every organisation should implement even the most basic cybersecurity controls.

Four Stages of a Cyber Attack

Common cyber-attacks will follow four stages;

No alt text provided for this image

Cyber security

Let’s look at what happens at each stage including the affects it can have on you and what the cybercriminal does at each stage.

Survey

The Survey stage is the first part of a common cyber-attack. The hacker will be investigating and analysing available information about the target to identify potential vulnerabilities. It’s the easiest stage to execute for the hackers but doesn’t always guarantee results. They can look for open source information such as social media or use readily available commodity toolkits and techniques.

Delivery

Once an attack reaches the delivery stage cyber criminals can start to exploit vulnerable systems on your network. Infected E-mails or websites can see malicious code downloaded onto your devices. The malware can also include already infected devices such as USB sticks. The more information the cyber criminals gather in the survey stage, the more likely the delivery phase will be successful. 

Breach

The breach stage is where the damage starts to take place. The attackers will be able to make changes that affect the system’s operation. They can gain access to online account and systems which in turn gives them full control of a device. Despite achieving a high level of access, they can still go undetected without the user knowing.

Affect

Depending on their motivation, the attacker may seek to explore your systems, expand their access and establish a persistent presence (a process sometimes called ‘consolidation’). Taking over a user’s account usually guarantees a continuing presence. Taking over an administrator’s account is an attacker’s Holy Grail. With administration access to just one system, they can try to install automated scanning tools to discover more about your networks and take control of more systems. When doing this, they will take great care not to trigger the system’s monitoring processes, and they may even disable them for a time.

Survey

If you can make the survey stage difficult for the hackers, it will decrease your chances of suffering a cyber-attack massively. You will never stop 100% of attacks, but you can follow these two steps to help your business;

  • User training – Previously mentioned. Make sure everybody is aware.
  • Secure configuration – Implement a security protocol at your work such as password protection, and administrator rights 

Delivery  

If the hacker gets past the survey stage, you can still block the attacks. Instead of personal changes to prevent the delivery stage you need changes to your network;

  • Up-to-date malware protection – Malware protection will stop software that tries to gain access or damage a computer without the knowledge of the owner.
  • Firewalls and proxy servers – A firewall filters what will come through onto your network. Anything that looks like spam or an attack isn’t allowed onto the network.
  • Technically enforced password policy – See below for our password guide.
  • Secure configuration – See the previously mentioned survey stage.
  • Everybody can be responsible for the first two stages of mitigation.

 

Breach

  • The breach stage is dangerous as it’s where the hacker first gets access to your network, but there are ways you can protect yourself;
  • Effective patch management – This is making sure the process of deploying and maintaining software in business gets planned and checked correctly.
  • Malware protection with internet gateway – See above.
  • Well implemented and maintained user access controls – Make sure each member only has access to what they need and nothing more. Keep a record of who has access to what.
  • Secure configuration – Yes, it’s here again!
  • User training, education and awareness – This stage should be for the most advanced members of your team (managers, etc.).
  • Monitoring capability – Not only should you make sure that all members of staff are aware of cyber-attacks and how to avoid them but make sure they can carry out the techniques. If it comes quickly to them, let them teach others!

Affect

Once a cybercriminal gets to this stage it can be challenging to stop the attack. The good news is by following the previously mentioned controls you will prevent most attacks that use commodity capabilities. If the hacker is using bespoke capabilities, it stands a good chance they will be able to get into your system.

To help with this stage, you should understand what normal activity looks like on your network. Having systems that detect unusual activity will help safeguard you against any attacks. Just by reading this article you’ll already be more clued up on cyber-attacks then the majority of business.

By understanding the common stages and how they can harm your business it allows you to think logically about your cybersecurity.


Don't let inferior IT support hold back your business - Speak to one of our experts today and see how we can help your business reduce risk and achieve success using our fully managed IT support service.


Contact Aero Networks today on 0191 484 1230 

To view or add a comment, sign in

More articles by Sean Kennedy

  • Why is it so important to future-proof your IT infrastructure?!

    Why is it so important to future-proof your IT infrastructure?!

    Do you feel like you have to look into a crystal ball to predict what technology to invest in for your company? We’ve…

  • What is a firewall and why your business needs one?...

    What is a firewall and why your business needs one?...

    We are often asked: What is a firewall and what does it do? Why do I need it for my business? Firewalls are an…

  • What is included in our IT support service?

    What is included in our IT support service?

    It is important to know what IT support services are included in your managed service agreement, when selecting or…

  • What is Malware?

    What is Malware?

    Short for malicious software, you may have heard the term malware used when it comes to computer security. I often get…

  • What Is Microsoft Teams, and Is It Right for My Business?

    What Is Microsoft Teams, and Is It Right for My Business?

    What Is Microsoft Teams? Microsoft Teams is a collaborative communications app built for small businesses, large…

  • What is Office 365?

    What is Office 365?

    You will no doubt have used Microsoft Office applications like Word and Excel. You have probably seen adverts for…

  • Cybersecurity for businesses

    Cybersecurity for businesses

    I speak to many SME business owners who understand why the need cybersecurity, but are looking for honest…

  • What to expect when switching IT providers

    What to expect when switching IT providers

    Switching IT suppliers can feel daunting. If you are considering changing IT suppliers and unsure of what to expect…

  • Advantages of IT Support for small businesses

    Advantages of IT Support for small businesses

    Have you considered the advantages of IT support? Whether you are an entrepreneur starting up, or a small or medium…

  • End of support for Office 2010

    End of support for Office 2010

    Support for Office 2010 ended on October 13, 2020 and there will be no extension and no extended security updates. All…

Insights from the community

Others also viewed

Explore topics