Hacker Attacks and how to avoid them
Hacker attacks can strike like lightning from a clear sky. In recent years, several Danish companies have suffered from hacker attacks. In November of 2020, a large news agency was hit, resulting in having to shut down their server and IT systems and not being able to publish news as usual. Instead, they were forced to take their emergency system into use. In December of 2020, a large American cyber safety corporation was hit by a hacker attack resulting in great consequences for the American government as well as for multiple other firms. It is no longer a question of if you will suffer a hacker attempt but a more a question of when.
Protect the organisation againts hacker attacks
Hacker attacks have been a massive threat to organisations during the most recent years. A record number of phishing attacks was reported in 2020 – according to a study these hacker attacks made up as much as 79% of all reported security incidents at the surveyed companies. This was an increase of 11% compared to the previous year.
Avoiding Hacker Attacks via WIFI connections
Hackers and other cybercriminals typically attempt to gain access to your smartphone, computer, your data, and your systems by finding security loopholes, making you open e-mail attachments or click infected links in both e-mails or text messages.
Some hackers also attempt to gain access to your mobile devices through public WIFI connections, so you should always be critical when logging onto a public wireless network.
Reports from Centre for Cyber Security also show that hackers are scanning networks frequently in order to see whether there should be any loopholes to get in.
Threat Assessment From the Centre for Cyber Security
The Centre for Cyber Security has published a threat assessment regarding double extortion, which is a method that more hackers are starting to use. This means that they threaten to share the stolen information about e.g. customers or collaborative partners during their hacker attacks.
“It is important, that Danish authorities and companies consider the threat of leakage and resale of sensitive information into the preparation against targeted ransomware attacks,” says Thomas Lund-Sørensen, head of the Centre for Cyber Security.
This article will present 7 tips to arm yourselves against hacker attacks in your organisation.
Hacker attacks and how to avoid them in your organisation
Train your employees in cyber security, so they become more cyber aware. Having a strong technical set-up is not enough. A focus on human behaviour is also needed. 70-80% of all hacker attacks are caused by human mistakes and because of this, your employees need to learn good cyber security habits.
- Ensure regular back-up procedures so the back-up happens frequently and according to a structured plan. This way you will easier be able to restore important files the cyber criminals may have denied you access to, in case of hackers attacks.
- Have clear guidelines in your IT security policy.
Make sure that you and your employees
- Hoover the mouse over the link before you click on something in an e-mail, a text message, etc. If you do not trust the link, then do not open it. Do not open attachments from e-mail addresses, you do not trust.
- Update programs regularly and use anti-virus so no security holes occur.
- Use safe networks – on the go as well as when working from home.
- Update passwords regularly and make sure they are strong. Read more about strong passwords in our article.
If you suspect that your work computer has been hacked, you need to contact the IT administrator at your workplace immediately. If you are hacked on your private computer and if credit card details, NemID information, information about your net bank or other sensitive information has been lured out of you, you must immediately report it to the police.
If you suspect that your work e-mail is hacked, you must immediately inform the IT administrator at your workplace. If your private e-mail is hacked, it is a good idea to inform friends and family via other platforms to ensure that they will not open any files believing it is sent by you.