Cybercrime is not just for big business and Government agencies, in fact it is more prevalent among SMB's, where subtle vulnerabilities are more prevalent.
CYBER SECURITY SERVICES - GOSFORD, CENTRAL COAST
Definitions
Cybercrime the term used to describe crimes directed at computers or other information communications technologies and crimes where computers or ICTs are an integral part of an offence
Cyber security is the practice of defending computers, networks, servers, mobile devices, data from malicious attacks
A Cyber-attack is an offensive manoeuvre to attempt to expose, alter, disable, destroy, steal or gain information through unauthorised access to or make unauthorised use of an asset
Cyber crime occurs at 5 levels
- Computer as a tool - Fraud, identity theft, phishing scams, spam, propagation of illegal material
- Computer as a target - Viruses, denial of service, malware
- Cyberterrorism - Government level attacks on foreign intelligence services and governments
- Cyberextortion - When a system is subjected to or threatened with repeated denial of service, ransomware or other attacks by malicious hackers
- Cyberwarfare - National-level attacks on other national-level agencies or infrastructure
Preventing or limiting cyber attacks
The Strategies to Mitigate Cyber Security Incidents is a prioritised list of mitigation strategies to assist organisations in protecting their systems against a range of adversaries. The mitigation strategies can be customised based on each organisation's risk profile and the adversaries they are most concerned about. This is known as the Essential Eight and is an all-embracing set of initiatives, ideal for small to large businesses.
The Essential Eight is split into three categories
1. Mitigation Strategies to Prevent Malware Delivery and Execution
To prevent the execution of unwanted applications, patch/mitigate computers with high-risk vulnerabilities, block unvetted macro's and disable unneeded features
2. Mitigation Strategies to Limit the Extent of Cyber Security Incidents
Restrict administrative privileges, know the benefit of using up to date operating systems and making it harder for adversaries to gain access
3. Mitigation Strategies to Recover Data and System Availability
Ensure data and business recovery after a cyber security incident