01 / RESOURCES / THE SUGARSHOT BLOG

5 Tricks Cybercriminals
Use To Hack Your
Computer Network

Posted on December 6, 2017

The world is full of cybercriminals. They penetrate complicated data structures of huge credit-monitoring companies like Equifax and snatch personal information from millions of people. They release sensitive customer data from discreet businesses like Ashley Madison to the public. They spy on celebrities through webcams, lock down public utility systems like the German railway and steal thousands of gigabytes of information from high-profile government entities like the CIA.   Cybercriminals also target small businesses like yours — and extort them for thousands of dollars. Having a dedicated security team equipped with the most up-to-date technology is critical — but it’s not enough. You must stay informed.   So, let’s take a look at the five most common ways cybercriminals infiltrate a network.

The 5 Most Common Cybercrimes

1. Phishing Scams

Phishing is an age old cyber crime. If you’ve ever recevied an email from a “Nigerian prince” asking for money, you’ve been targeted with a phishing scam.   Most phising scams work like this: You receive an email from a “high-ranking employee” with whom you’ve been working on a project. The email instructs you to click on a link so the sender can access “vital information” for the project.   When you click on the link, it rapidly installs malware on your computer which spreads through your network and locks out everyone in the company.   While most phishing emails are easy to spot, they’re becoming increasingly sophisticated. As Thomas Peters writes for “Newsweek,” “The best messages look like they’re trying to protect the company.”   For example, one well-meaning system administrator opened a PDF titled, “How to Avoid a Phishing Attack.” It  spread malware to the company server! How’s that for irony?

2. Social Engineering

Social engineering is a type of hacking that uses real people to carry out an attack, rather than intricate lines of code.   Social engineers call you pretending they’re someone else and try to get emails, passwords, and other information from you that they can later use for an attack.   So what does social engineering look like? Here’s an example: Your IT guy receives a call from the “secretary” of one of your clients. She says she’s experiencing problems with your service due to a firewall.   Convinced, your IT professional alters the firewall to accommondate the “secretary.” Before you know it, a cybercriminal has access to your entire security system, or lack thereof.

3. Password Hacking

Despite your best efforts, it doesn’t take much for a cybercriminal to obtain company passwords.   Hackers are great at guessing easy passwords, but even clever and complicated ones filled with exclamation points and random numbers are accessible too.   You know those “security” questions that allow you to reset a password? Like, “What was the name of your first dog?” or “When is your anniversary?” Cybercriminals can easily find answers to those through social engineering or social media and hack into business critical accounts.

4. Fault Injection

Fault injection is when sophisticated hackers scan your business’s network or software source code for weak points.   Once located, hackers target weak points to deliver viruses, redirect website links to malware and crash your system.

5. USB-based Malware

Some hackers hand out USB sticks with malware on them in hopes you’ll stick one into your computer. Be wary of the USB sticks you’re handed at conferences or other industry events. Never use a USB stick if you don’t know its origin.   So with so many cyberthreats out there, how do you protect yourself?

How To Protect Yourself From Cybercrime

Knowing the strategies hackers deploy is only half the battle. Cybercrime techniques are constantly changing — it’s impossible to keep up by yourself.   At SugarShot, we want to help. Download the FREE chapter, “I’ve Been Hacked! What Should I Do?” from our eBook, Sitting Duck – Why YOUR Business Is A Cybercriminal’s Ideal Target. We discuss what to do if you’ve been hacked and how to prevent cyber attacks in the future.   If you have any questions about cybersecurity, contact SugarShot today!  

Competitively priced. Award winning support. Get a quote.
This form collects your details to add you to our monthly newsletter list. We treat your data with the utmost security and will never sell it to third parties. Read our privacy policy for more.
logo1
logo2
logo3
logo4
logo5
logo6