Information Security

Common Information Security Attacks

There's a battle underway for your company's data. Knowing how the enemy operates is an important aspect of information security. Here are some common attack methods that the bad guys use to get access to your company information.

Does your small business take information security seriously?

You can bet that hackers and data thieves do - they're dead serious about their efforts to infiltrate your server to exploit your customers' data for their own personal gain.

There are a lot of steps you can take to protect your business' sensitive information. The problem is that cyber crooks are always coming up with new ways to gain access to your system. So at a minimum, it's important to stay on top of the most common information security attacks and the methods you can use to counter them in your workplace.

  • Keylogging. Believe it or not, hackers have the ability to implant software on your company's computers for the purpose of hijacking passwords and gaining access to sensitive data. It can be difficult to spot keylogging programs, but you can protect yourself from them by using dynamic passwords and variable authentication methods.
  • Account targeting. One of the more common intrusion methods is when a hacker targets a specific account, entering potential passwords over and over to gain access. The laws of probability dictate that sooner or later they will be successful. To counter account targeting, install a system lockout feature that kicks in after a limited number of unsuccessful password attempts.
  • Password targeting. The converse of account targeting is password targeting. Instead of focusing on a single user account, hackers enter a common password into multiple accounts. Some of the ways to protect yourself from this attack method are to employ randomly generated passwords or passwords with a high combination of letters and numbers.
  • Workspace attacks. A highly successful information security attack method calls for intruders to lurk around an office in search of an unmanned workspace. The hacker then uses the workspace's computer to create their own password and user ID. The best protection for this intrusion method is an automatic logout setting that activates after a period of inactivity.
  • Dumpster diving. Conduct a thorough audit of your workplace and you would probably find that a large number of your employees have written their username and password down on pieces of paper strewn throughout the office. Resourceful hackers have been known to dumpster dive for documents that contain passwords and user IDs. The only way to overcome this security challenge is to train your staff against writing down their passwords. Part

Share this article

Additional Resources for Entrepreneurs

Lists of Venture Capital and Private Equity Firms

Franchise Opportunities


Business Glossary


Conversation Board

We greatly appreciate any advice you can provide on this topic. Please contribute your insights on this topic so others can benefit.

Leave a Reply

Questions, Comments, Tips, and Advice

Email will not be posted or shared
Code Image - Please contact webmaster if you have problems seeing this image code

Problem Viewing Image? Load New Code