October 23, 2019  
 
Gaebler.com is a daily online magazine covering small business news. We help entrepreneurs transform ideas and innovations into greatness.

Articles for Entrepreneurs

 

Information Security

 

Common Information Security Attacks

There's a battle underway for your company's data. Knowing how the enemy operates is an important aspect of information security. Here are some common attack methods that the bad guys use to get access to your company information.

Does your small business take information security seriously?

You can bet that hackers and data thieves do they're dead serious about their efforts to infiltrate your server to exploit your customers' data for their own personal gain.

There are a lot of steps you can take to protect your business' sensitive information. The problem is that cyber crooks are always coming up with new ways to gain access to your system. So at a minimum, it's important to stay on top of the most common information security attacks and the methods you can use to counter them in your workplace.

  • Keylogging. Believe it or not, hackers have the ability to implant software on your company's computers for the purpose of hijacking passwords and gaining access to sensitive data. It can be difficult to spot keylogging programs, but you can protect yourself from them by using dynamic passwords and variable authentication methods.
  • Account targeting. One of the more common intrusion methods is when a hacker targets a specific account, entering potential passwords over and over to gain access. The laws of probability dictate that sooner or later they will be successful. To counter account targeting, install a system lockout feature that kicks in after a limited number of unsuccessful password attempts.
  • Password targeting. The converse of account targeting is password targeting. Instead of focusing on a single user account, hackers enter a common password into multiple accounts. Some of the ways to protect yourself from this attack method are to employ randomly generated passwords or passwords with a high combination of letters and numbers.
  • Workspace attacks. A highly successful information security attack method calls for intruders to lurk around an office in search of an unmanned workspace. The hacker then uses the workspace's computer to create their own password and user ID. The best protection for this intrusion method is an automatic logout setting that activates after a period of inactivity.
  • Dumpster diving. Conduct a thorough audit of your workplace and you would probably find that a large number of your employees have written their username and password down on pieces of paper strewn throughout the office. Resourceful hackers have been known to dumpster dive for documents that contain passwords and user IDs. The only way to overcome this security challenge is to train your staff against writing down their passwords. Part

Related Articles

Want to learn more about this topic? If so, you will enjoy these articles:

Creating an Information Security Process
How to Conduct an Information Security Risk Assessment


Conversation Board

We greatly appreciate any advice you can provide on this topic. Please contribute your insights on this topic so others can benefit.


Questions, Comments, Tips, and Advice  Code Image - Please contact webmaster if you have problems seeing this image code
Problem Viewing Image
Load New Code

 

 

Additional Resources for Entrepreneurs

Search Engine Marketing

Social Marketing Optimization

Business Forms

Business in the Jungle - Business in Fiction - Negotiating

Radio Ad Costs

Newspaper Advertising Rates

City-Specific Resources for Entrepreneurs

Small Business Insurance

Global Entrepreneurship

China & Entrepreneurs