Featured Services

Types of CS attacks and prevention methods – general security attacks

There are many different types of cyber-attacks and it can sometimes be overwhelming knowing where to start looking when trying to familiairize yourself with them. So what are some of the most common cyberattacks and how can you prevent them?

Ransomware
As the name suggests, ransomware holds your computer and all your files ransom, usually for a large cryptocurrency fee. It is a commonly used type of malware and is often distributed via open remote desktop ports and dodgy email attachments. To prevent ransomware attacks it is recommended to scan your emails with antivirus tools, ensure remote desktop ports are not publicly accessible and avoid opening unknown file attachments or visiting untrusted websites.

Malware
While ransomware is probably the most common type of malware out there, it is certainly not the only kind of malware. Malware can include different types of malicious software such as trojans, worms, ransomware, spyware and adware. Most types of malware can be prevented by a robust antivirus solution and avoiding downloading unknown files.

Phishing
Phishing . More recently a variety of phishing known as “smishing” has also gained popularity due to the widespread use of mobile devices. The best way to prevent phishing is to invest in email spam filtering tools as well as to properly educate your staff on how to recognise emails from untrusted sources and to never click on any email they are unsure about.

Distributed-Denial-of-Service (DDoS)
Distributed-Denial-of-Service attacks are a type of attack where a network is flooded with a large volume of traffic with the intention of shutting down the service. The best way to prevent DDoS attacks is to be able to detect them. Once they are detected a number of tools can be used including anti-DDoS solutions as well as balancing load and routing traffic.

While these are among the most common attacks, it should be noted that these are not the only sorts which exist. For example, there are other types of attacks you may here about such as Man-in-the-Middle and SQL injection.