You may not realize it, but you, your company, and your employees are all targets for cyber criminals. Computers, mobile devices, accounts and your information all have tremendous value.
USERNAMES & PASSWORDS
If your computer or mobile devices are compromised, cyber criminals can install programs on your computer that can log all of your keystrokes. This program is called a keylogger. Keyloggers can be used to log your information to any account, such as:
- Banking
- iCloud or Google Drive
- Online Shopping
EMAIL HARVESTING
Once access is obtained, cyber criminals can read your email for information they can use to sell to others. Cyber criminals can also send emails from your account that can be used to phish your contacts or to distribute malware.
VIRTUAL GOODS
If your computer is compromised, cyber criminals can copy, steal, and sell your virtual goods including:
- Online Gaming Codes
- Software Licenses
- Operating System Licenses
BOTNET
Cyber criminals can use your computer as part of a botnet. A botnet is a group of computers that are all working towards a common goal. Cyber criminals can utilize your compromised device to send out millions of spam emails or launch a Denial of Service attack. A Denial of Service attack is where cyber criminals attempt to prevent legitimate users from accessing the service. This Denial of Service does not only affect network infrastructure, but it can also affect your local workstation.
IDENTITY HIJACKING
Your online identity can be stolen and used to commit fraud or sell your identity to others. The cyber criminals can open fake email and social media accounts, online shopping, and much more in your name.
WEB SERVER
Your compromised device can also be turned into a webserver, which can be used for criminal activity, such as:
- Hosting phishing websites to steal other people’s usernames and passwords
- Hosting attacking tools that will hack other computers
- Distributing child pornography, pirated videos, or stolen music
FINANCIAL DATA
Cyber criminals can scan your system looking for valuable information, for example:
- Credit Card Numbers
- Tax Records
- Financial Investment or Retirement Plans
- Social Security Numbers
EXTORTION
Finally, if your device is compromised, cyber criminals can take over your computer and demand money. They can do this in several ways, including:
- Taking pictures of you with your computer’s web camera
- Ransomware – Encrypting all the data on your computer and demanding payment to decrypt it
- Tracking the websites you visit and threatening to publish that history
GOOD NEWS – ORBIS SOLUTIONS CAN HELP
Being a target is unnerving, but it shouldn’t keep you up at night. We can help. Orbis Solutions uses industry-leading technology to help secure your company’s network and each endpoint. Cybersecurity is what we do.
- Email Security
- Endpoint Security
- Detection & Response
- Perimeter Security
- Phishing & Security Awareness Training
- Vulnerability Management
Just because you’re a target for cyber criminals doesn’t mean you have to be their next victim. Contact us for a no cost cyber security risk assessment.