Spud in the News

The Four Cyber Security Threats - Are You Aware and Are You Prepared?

The Four Cyber Security Threats - Are You Aware and Are You Prepared? - Spud in the News | Spud Software - Screen_Shot_2017-09-20_at_12

Protecting your cyber security is more important than ever.

On summer weekends we often find ourselves wanting to unplug from everything not associated with cookouts, swimming and playing outdoors. But if you were following the news this weekend you may have noticed a story about hackers targeting the email accounts of the British Parliament. The accounts of 90 MPs were compromised in what was labeled a "brute force attack" that left the British government scrambling to secure their systems.

This instance was an example of one of the four major types of cyber attacks. And as our world is increasingly dependent on the connectivity of the internet, it's important to understand the challenges associated with keeping our information secure. To increase awareness, we're highlighting each of the forms of cyber attacks. Knowing what to look for will help you in putting together a cyber security strategy to protect yourself and your data.

The Four Cyber Security Threats

  1. Cyber Crime: 
    Of all the types of cyber security threats, this is the most common. As the majority of cyber attacks are initiated by profit seekers, cyber crime is the one threat that banks and retailers spend the most time fighting. Whether a hacker is stealing credit card and account numbers or skimming money off business transactions, these intrusions into our data and our accounts are a priority for security experts to stop. You also play an important part in protecting your information by guarding your credit transactions, carefully reviewing monthly statements, and keeping an eye out for devices like skimmers at gas stations.
     
  2. Cyber Espionage:
    For companies and agencies that have classified and private data, cyber espionage is a major concern. Hackers will try to infiltrate this information for a variety of reasons, including dissemination to competing companies or nations. Government agencies like the NSA are a prime target for cyber espionage, but in the expanding world of the internet of things, this could conceivably spread to private citizens just going about their daily lives. So it's important for organizations and individuals alike to put practices in place to protect against cyber spying.
     
  3. Cyber Nuisance:
    Hacktivists, who are computer hackers whose activity is aimed at promoting a social or political cause, are the primary perpetrators of cyber nuisance (although there are those who engage in these tactics for personal or financial gain as well). These hackers are usually looking to gather data on companies or government agencies that they then release to the public or they engage in hacking to control the outcome of political or financial decisions. And sometimes this cyber nuisance can be more nightmare than nuisance. For instance, in 2011 a hacktivist group hacked and shut down the Egyptian government sites until President Hosni Mubarak stepped down. Hacktivists were also responsible for the 2014 Sony hack that resulted in the release of confidential internal documents and emails of senior executives.
     
  4. Cyber Warfare:
    This particular threat has experienced increased news coverage recently with the release of the WannaCry virus and other governmental hacking efforts. Cyber Warfare is usually perpetrated by nation states against other nations in an effort to promote national interests or gain a competitive advantage. However, cyber warfare can also be used by nations or private entities to secure commercial gain. And countries across the globe are gearing up for cyber warfare. Recent legislation introduced in Canada would allow the Canadian government the ability to launch cyber attacks against foreign governments although it restricts the Communications Security Establishment from targeting Canadians or Canadian networks as well as forbidding the CSE to hurt or kill anyone through its online actions.
We conducted an informal poll to find out which threats are most concerning to our readers. Sixty percent of respondents were most concerned with Cyber Crime affecting their daily lives, while 20% were most concerned about Cyber Warfare and Cyber Espionage each.
The Four Cyber Security Threats - Are You Aware and Are You Prepared? - Spud in the News | Spud Software - Screen_Shot_2017-09-20_at_12
Whichever cyber security issue has you the most concerned, recent events make it clear that having a security strategy is a must for organizations and individuals alike. If you're looking to implement security measures for your company, we'd be happy to discuss options that would help you keep your data and systems secure.
 
The Four Cyber Security Threats - Are You Aware and Are You Prepared? - Spud in the News | Spud Software - Screen_Shot_2017-09-06_at_11

We'd like to re-introduce you to Bonnie. Bonnie is a sweet girl who just wants to be with her people. She'll stick to you like velcro! She weighs 75 pounds but thinks she's a 7.5 pound lap dog. She's good with other dogs and she'd just love to be a part of your forever family.

The Four Cyber Security Threats - Are You Aware and Are You Prepared? - Spud in the News | Spud Software - Screen_Shot_2017-09-20_at_12

If you're interested in adopting Bonnie or any of the other residents at Lucky Day Animal Rescue, visit their website and fill out an adoption form.  You can make it some animal's Lucky Day!

The Four Cyber Security Threats - Are You Aware and Are You Prepared? - Spud in the News | Spud Software - Screen_Shot_2017-09-06_at_11

The Four Cyber Security Threats - Are You Aware and Are You Prepared? - Spud in the News | Spud Software - Screen_Shot_2017-09-20_at_12The "Spuds of Anarchy" biking team hit the trails last week decked out in their brightest gear. What an awesome way to stay in shape and promote Spud Software. Way to go, guys!

Have you seen a Spud shirt lately? Send us a picture to be featured in our newsletter!

The Four Cyber Security Threats - Are You Aware and Are You Prepared? - Spud in the News | Spud Software - Screen_Shot_2017-09-06_at_11

"That man is a success who has lived well, laughed often and loved much."

- Robert Louis Stevenson

Do you know the benefits of a good UX design?

Do you know the benefits of a good UX design? Tech people throw around a lot of acronyms. We have HTML, CSS, .NET, SQL, C#, PHP - the list is like a mixed up bowl of alphabet soup. And for most people, these acronyms are as confusing as the...

We Are Hiring!

Referral Incentive for Qualified Candidates* Have you been looking for a little extra cash? Maybe you're saving up for a jet ski or camper. Whatever it is, we know everyone appreciates a little extra money in their pockets. That's why...

Are you being safe while browsing the web?

Are you being safe while browsing the web? We all love the internet. It helps us with so many things, like keeping us up to date on the latest news, learning something new, researching our favorite subject, or watching that funny video of a...

Software is Not 1 Size Fits All

Why Software Isn’t One-Size-Fits-All For some companies, out-of-the-box software solutions are not really solutions at all. If you’re reading this newsletter, you’re probably one of those companies, frustrated because you...

How do you celebrate Saint Patrick's Day?

How do you celebrate Saint Patrick’s Day? Saint Patrick’s Day is a holiday all about having fun. It’s a day that everyone is a little bit Irish; a day to hang out with good friends while eating Irish stew and drinking a...

What are dashboards and why do you need them?

A Business Dashboard is quite a powerful tool that is beneficial to both you and your company. Your business generates a massive amount of data, from simple things such as who is logging hours to more complex items such as project tracking....

New

Page: 12345 - All
Spud Software, Inc. BBB Business Review