Cybersecurity experts say that 2020 was the year not only with the highest number of cyberattacks, but that they also had an impact never seen before. Both individuals and companies must know in detail what are the main risks in computer security today and, above all, what they can do to prevent them.
Attack of "Man in the Middle"
The so-called "Man in the Middle" attack consists
of the interception of information sent between two or more devices. Most
dangerous of all, users are not even aware of the hacker's presence. It
silently infiltrates to steal debit or credit cards, as well as usernames and
passwords. Is there anything users can do to avoid it? The most important thing
is to verify that websites, especially when making an online purchase, are
protected with the HTTPS protocol. In addition, when using instant messaging
applications, it is advisable to use some such as Telegram or WhatsApp, which
guarantee end-to-end encryption of messages. bacobolts
Phishing technique
Phishing is the most common type of attack today. It is a
scam in which cybercriminals impersonate a certain company or organizations to
obtain personal information from victims. To give a simple example,
cybercriminals can send an e-mail posing as the DGT reporting an unpaid fine.
The email has attached a link for users to access the page to make the payment.
In this way, as soon as you enter your debit or credit card number, hackers get
hold of it.
How to avoid falling into these types of traps? It is
essential to pay close attention to all emails. Usually those that are scams
contain some misspelling and the writing style is not correct. This occurs
because in many cases the hackers are foreigners and use automatic translators.
In addition, it is necessary to verify that the sender is that of the company
or organization in question. It is usually very similar, although with a
different number, letter or symbol.
Malware: RAT
Have you heard of RATs? They are tools that hackers use to
access a certain device remotely without the victim being aware of it. They do
it to access their bank account in many cases because, as soon as the user
enters their digital banking app, cybercriminals take over their access
credentials.
Many of the RATs are distributed through phishing scams.
This is why it is so central to download files only from viable sources and to
verify which files are being downloaded before starting the download.
Connection to the WIFI router
And finally, we must not forget that a person who has a
computer device or equipment connected to the WIFI router of a network can
access, create and even delete files that are stored in shared folders. You
also have the possibility to intercept the transmitted data.
In addition to modifying the router's default password , it
is highly recommended to create separate networks so that, in the event of a
threat, not all computers and data are affected. It is also a good idea to
disable remote administration if it is not needed, as well as all functions
that are not in use.
At Anexia TecnologĂa
we are a company specialized in hardware and software, which offers 100%
personalized solutions to small and medium-sized companies. For any questions,
you can contact us.