{"id":2224,"date":"2019-10-18T08:08:08","date_gmt":"2019-10-18T13:08:08","guid":{"rendered":"https:\/\/www.titan.tech\/?p=2224"},"modified":"2021-09-30T01:01:22","modified_gmt":"2021-09-30T06:01:22","slug":"4-common-cyberthreats-to-your-business","status":"publish","type":"post","link":"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/","title":{"rendered":"4 Common Cyberthreats to Your Business"},"content":{"rendered":"<p>You don\u2019t have to be paranoid to believe that your IT infrastructure is vulnerable to attack at any moment -- because it\u2019s true. When it comes to online computing, a fortress mentality will pay you dividends in IT stability and robust protection of services. Because you\u2019re concerned about what might happen, you really want to learn as much as you can about the security risks that your business faces every day. In this article, we discuss four common cyber threats to your business and how you can deal with them.<\/p>\n<h3><strong>Malware<\/strong><\/h3>\n<p>Any software that was created with malicious intent could be considered malware. The term comes from the Latin root word <em>mal<\/em>, which simply means \u201cbad\u201d. Getting malware on your computer is bad news for you and your business. But malware is not a specific program or piece of code. It\u2019s actually a whole class of software that can ruin your day.<\/p>\n<p>A computer virus is perhaps the most common form of malware -- or the one that most often comes to mind. Just as biological viruses infect and spread through human contact, computer viruses infect computer systems and replicate to other devices through the internet. There are so many viruses out in cyberspace now that it\u2019s hard to keep up. That\u2019s the job of antivirus software, which usually doubles as anti-malware software because it deals with other malicious software as well.<\/p>\n<p>Other forms of malware include worms, trojans, spyware, adware, ransomware, botnets, rootkits, and keyloggers. These may be distinguished by how they infiltrate a computer system, what they do once they are there, or what the hacker intends to accomplish. A trojan, for instance, is generally downloaded as an add-on to a legitimate piece of software. Adware displays unwanted advertising through popups and other means. Ransomware attempts to disable a computer and exact money from the user.<\/p>\n<p>Defending against malware requires a multi-pronged strategy. First, try your best to avoid websites that you don\u2019t trust. We all like to surf the web, but we should be careful about what one writer calls \u201cpromiscuous browsing\u201d. Even with all the protection in place today, you don\u2019t want to push your luck. Second, make sure that your antivirus or anti-malware software is up-to-date. Bad guys are coming up with new malware every day, you need software that includes prevention or fixes for those hacks. Third, don\u2019t click on links from people you don\u2019t know. And our fourth piece of advice is just a warning:\u00a0 Be careful out there!<\/p>\n<h3><strong>Denial of Service<\/strong><\/h3>\n<p>This is an age-old problem that doesn\u2019t want to go away. You may have heard it referred to as denial of service (DoS) or distributed denial of service (DDoS). The purpose of this hack is to flood your server or network with so any requests that it can\u2019t handle all the traffic. When the congestion of data traffic becomes overwhelmed, the network element either stops functioning or is unavailable to other potential users.<\/p>\n<p>DDoS attackers have developed clever ways to carry out their attacks in the 21st century. Botnets are a collective of dispersed network devices that operate according to the instructions of the attacker -- in this case to bombard a target with traffic. These may be timed attacks that are designed in the software (malware) that infects the computers of unsuspecting users.<\/p>\n<p>Combating DDoS has two parts. First, you want to protect your IT infrastructure from attack. Second, you want to make sure that you are not unwittingly a part of someone\u2019s botnet attack yourself. To prevent DDoS, you\u2019ll want to make sure that your defenses include anti-malware software, firewalls, updated security patches, and good security settings. A DDoS protection service will help in both areas by monitoring for abnormal traffic flows in or out of your network.<\/p>\n<h3><strong>Man-in-the-Middle<\/strong><\/h3>\n<p>When a hacker is able to get between a user and an internet server, that\u2019s called a man-in-the-middle attack. He may do this by impersonating an online entity and enticing you to either submit sensitive data or execute an action to accomplish his purposes.<\/p>\n<p>Suppose you are in a public cafe and you want to take care of some online banking tasks. You go to the bank\u2019s website, type in your login information, and securely connect to your bank. If the hacker is somehow able to intercept your connection, he may be able to capture your ID and password or hijack your security certificate. Despite continued efforts to prevent these attacks, they are still common.<\/p>\n<p>Some of the methods that hackers use in performing man-in-the-middle attacks include:<\/p>\n<ul>\n<li>IP spoofing<\/li>\n<li>HTTPS spoofing<\/li>\n<li>DNS spoofing<\/li>\n<li>SSL hijacking<\/li>\n<li>Wi-Fi eavesdropping<\/li>\n<li>Stealing browser cookies<\/li>\n<\/ul>\n<p>One of the best defenses against man-in-the-middle attacks is the use of a virtual private network (VPN). You can get an inexpensive VPN service or application for your laptop or mobile phone. This will lock down your internet traffic when you are on a public Wi-Fi by putting it into an encrypted tunnel.<\/p>\n<h3><strong>Phishing<\/strong><\/h3>\n<p>When a hacker wants to catch some private data, he goes phishing. The practice includes putting out bait for unsuspecting users and hoping that they\u2019ll bite. This is often done with emails disguised to look like they come from a legitimate business.<\/p>\n<p>In the example pictured below, as explained <a href=\"https:\/\/security.berkeley.edu\/news\/phishing-example-paypal-we-need-your-help\" target=\"_blank\" rel=\"noopener noreferrer\">on the Berkeley website<\/a>, there are some telltale signs that the email is a scam. First, the message comes from an email address that definitely does not belong to PayPal. Second, you can see grammar mistakes in the message (e.g., \u201cyour informations\u201d). And third, when you do click the link it goes to a totally different website -- not PayPal.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2225\" data-permalink=\"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/paypal\/#main\" data-orig-file=\"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/10\/paypal.png\" data-orig-size=\"974,887\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"PayPal\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/10\/paypal-300x273.png\" data-large-file=\"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/10\/paypal.png\" class=\"alignnone size-medium wp-image-2225\" src=\"https:\/\/www.titan.tech\/wp-content\/uploads\/cache\/2019\/10\/paypal\/2053665312.png\" alt=\"PayPal\" width=\"300\" height=\"273\" \/><\/p>\n<p>Usually the spam filter in your email service will catch these and file them accordingly. But you must take responsibility and be careful. Remember, a whole host of political emails were hacked prior to the 2016 election because a campaign manager fell for a phishing scam. To avoid phishing, follow this rule:\u00a0 When in doubt, don\u2019t click!<\/p>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>Of course, there are many more threats to your business that we haven\u2019t covered here. If this seems overwhelming, feel free to <a href=\"https:\/\/www.titan.tech\/contact-us\/\">contact us<\/a>. There\u2019s no company better positioned to provide <a href=\"https:\/\/www.titan.tech\/services\/managed-security-services\/\">Cincinnati IT security services<\/a>. We specialize in <a href=\"https:\/\/www.titan.tech\/services\/managed-it-services\/\">IT services<\/a> to Cincinnati, Dayton, and surrounding areas.\u00a0 We can help you identify security vulnerabilities and prevent attacks that can devastate your business. And we can educate you and your team on the best practices for IT security. We look forward to hearing from you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You don\u2019t have to be paranoid to believe that your IT infrastructure is vulnerable to attack at any moment &#8212; because it\u2019s true. When it comes to online computing, a fortress mentality will pay you dividends in IT stability and robust protection of services. Because you\u2019re concerned about what might happen, you really want to [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":2226,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[7],"tags":[338,1699,369],"class_list":["post-2224","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-malware","tag-man-in-the-middle","tag-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>4 Common Cyberthreats to Your Business - Titan Tech IT Support<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 Common Cyberthreats to Your Business - Titan Tech IT Support\" \/>\n<meta property=\"og:description\" content=\"You don\u2019t have to be paranoid to believe that your IT infrastructure is vulnerable to attack at any moment -- because it\u2019s true. When it comes to online computing, a fortress mentality will pay you dividends in IT stability and robust protection of services. Because you\u2019re concerned about what might happen, you really want to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Titan Tech\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-18T13:08:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-30T06:01:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/10\/cyberthreats-businesses-600x314.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"314\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Titan Tech\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Titan Tech\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/\"},\"author\":{\"name\":\"Titan Tech\",\"@id\":\"https:\/\/www.titan.tech\/#\/schema\/person\/d5fbca5fdaee154254d8b179f50c8af4\"},\"headline\":\"4 Common Cyberthreats to Your Business\",\"datePublished\":\"2019-10-18T13:08:08+00:00\",\"dateModified\":\"2021-09-30T06:01:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/\"},\"wordCount\":1099,\"image\":{\"@id\":\"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/10\/cyberthreats-businesses.jpg\",\"keywords\":[\"malware\",\"Man-in-the-Middle\",\"phishing\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/\",\"url\":\"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/\",\"name\":\"4 Common Cyberthreats to Your Business - Titan Tech IT Support\",\"isPartOf\":{\"@id\":\"https:\/\/www.titan.tech\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/10\/cyberthreats-businesses.jpg\",\"datePublished\":\"2019-10-18T13:08:08+00:00\",\"dateModified\":\"2021-09-30T06:01:22+00:00\",\"author\":{\"@id\":\"https:\/\/www.titan.tech\/#\/schema\/person\/d5fbca5fdaee154254d8b179f50c8af4\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/#primaryimage\",\"url\":\"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/10\/cyberthreats-businesses.jpg\",\"contentUrl\":\"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/10\/cyberthreats-businesses.jpg\",\"width\":780,\"height\":520},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.titan.tech\/#website\",\"url\":\"https:\/\/www.titan.tech\/\",\"name\":\"Titan Tech\",\"description\":\"Leave IT to us\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.titan.tech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.titan.tech\/#\/schema\/person\/d5fbca5fdaee154254d8b179f50c8af4\",\"name\":\"Titan Tech\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/20c17e0d9364b8500becce7f911a817e44683c855a01592770e2cef8c204db84?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/20c17e0d9364b8500becce7f911a817e44683c855a01592770e2cef8c204db84?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/20c17e0d9364b8500becce7f911a817e44683c855a01592770e2cef8c204db84?s=96&d=mm&r=g\",\"caption\":\"Titan Tech\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"4 Common Cyberthreats to Your Business - Titan Tech IT Support","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/","og_locale":"en_US","og_type":"article","og_title":"4 Common Cyberthreats to Your Business - Titan Tech IT Support","og_description":"You don\u2019t have to be paranoid to believe that your IT infrastructure is vulnerable to attack at any moment -- because it\u2019s true. When it comes to online computing, a fortress mentality will pay you dividends in IT stability and robust protection of services. Because you\u2019re concerned about what might happen, you really want to [&hellip;]","og_url":"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/","og_site_name":"Titan Tech","article_published_time":"2019-10-18T13:08:08+00:00","article_modified_time":"2021-09-30T06:01:22+00:00","og_image":[{"width":600,"height":314,"url":"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/10\/cyberthreats-businesses-600x314.jpg","type":"image\/jpeg"}],"author":"Titan Tech","twitter_misc":{"Written by":"Titan Tech","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/#article","isPartOf":{"@id":"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/"},"author":{"name":"Titan Tech","@id":"https:\/\/www.titan.tech\/#\/schema\/person\/d5fbca5fdaee154254d8b179f50c8af4"},"headline":"4 Common Cyberthreats to Your Business","datePublished":"2019-10-18T13:08:08+00:00","dateModified":"2021-09-30T06:01:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/"},"wordCount":1099,"image":{"@id":"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/10\/cyberthreats-businesses.jpg","keywords":["malware","Man-in-the-Middle","phishing"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/","url":"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/","name":"4 Common Cyberthreats to Your Business - Titan Tech IT Support","isPartOf":{"@id":"https:\/\/www.titan.tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/#primaryimage"},"image":{"@id":"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/10\/cyberthreats-businesses.jpg","datePublished":"2019-10-18T13:08:08+00:00","dateModified":"2021-09-30T06:01:22+00:00","author":{"@id":"https:\/\/www.titan.tech\/#\/schema\/person\/d5fbca5fdaee154254d8b179f50c8af4"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.titan.tech\/2019\/10\/4-common-cyberthreats-to-your-business\/#primaryimage","url":"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/10\/cyberthreats-businesses.jpg","contentUrl":"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/10\/cyberthreats-businesses.jpg","width":780,"height":520},{"@type":"WebSite","@id":"https:\/\/www.titan.tech\/#website","url":"https:\/\/www.titan.tech\/","name":"Titan Tech","description":"Leave IT to us","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.titan.tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.titan.tech\/#\/schema\/person\/d5fbca5fdaee154254d8b179f50c8af4","name":"Titan Tech","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/20c17e0d9364b8500becce7f911a817e44683c855a01592770e2cef8c204db84?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/20c17e0d9364b8500becce7f911a817e44683c855a01592770e2cef8c204db84?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/20c17e0d9364b8500becce7f911a817e44683c855a01592770e2cef8c204db84?s=96&d=mm&r=g","caption":"Titan Tech"}}]}},"yoast":{"focuskw":"","title":"","metadesc":"","linkdex":"","metakeywords":"","meta-robots-noindex":"","meta-robots-nofollow":"","meta-robots-adv":"","canonical":"","redirect":"","opengraph-title":"","opengraph-description":"","opengraph-image":"","twitter-title":"","twitter-description":"","twitter-image":""},"jetpack_featured_media_url":"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/10\/cyberthreats-businesses.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/posts\/2224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/comments?post=2224"}],"version-history":[{"count":5,"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/posts\/2224\/revisions"}],"predecessor-version":[{"id":2609,"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/posts\/2224\/revisions\/2609"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/media\/2226"}],"wp:attachment":[{"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/media?parent=2224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/categories?post=2224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/tags?post=2224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}