Bharat Bhise HNA has worked in the world of cybersecurity for many years and he is certainly an expert in this field. For many years I can remember Bharat struggling to get companies to understand the importance of cybersecurity but after some high profile hacks which we have seen to the likes of Sony and Visa, more and more companies have began to take note of what people like Bharat are trying to tell them. To understand the importance for your business it is valuable if you understand the types of cyberattacks which could take place, and these are the most common which hackers use to breach systems.

Denial of Service

One of the attacks which you may already be familiar with are DoS or DDoS attacks, which aim to bring down a network or an entire system. Unlike many attacks out there, these are very rarely used to steal data or information, they are intended to debilitate a system with the aim of proving strength in the case of the hacker, or sending a message to a company which suggests that they are at risk. These attacks basically work by sending hundreds of thousands of requests to a server all at once, the server is unable to cope with so many requests and so it shuts down. For a business this will cost a lot of money and will damage a reputation.

MitM Attack

The Man in the Middle attack is often used to breach mainframes through the manipulation of a user signing in to a private network. When a user logs in to the system the hacker is able to take control of their sign in, log them out and change their IP address for their own, before signing in again. This will give the infiltrator access to the system from a remote location both now and in the future. The user rarely reports being logged out, assuming that it is a glitch in the system. This type of attack should be of concern to any company which stores personal details or important information, as it will all be at risk.

Phishing

Phishing attacks have been going on for many years and you may even have seen evidence of this type of attack before. The way in which these attacks work is by sending huge volumes of emails out, which can contain any type of information inside them. For example they may appear to be from PayPal, asking the user to login and change their password, in this instance the hacker operates a mirror site which they can then use to obtain login details. These attacks aren’t always about theft, sometimes they feature a link which, when clicked on, will download a trojan horse or malware virus to the system. If this happens in your business then it will cost you a lot of money to have the virus removed. Most people ignore these emails but it only takes one or two to interact with them and the hacker will get what they wanted.