SlideShare a Scribd company logo
1 of 14
Download to read offline
Presented by Ivan Yordanov
Cyber Crimes and the Threat
They Pose to Your Business
Go Live UK Ltd
52 Great Eastern Street
London, EC2A 3EP
www.goliveuk.com
Е. info@goliveuk.com
T. 020 77299 330
F. 087 00941 053
Regardless of whether you own a small, family sized business or a large company with lots of
employees, nobody is invulnerable to attacks on the Internet. With things such as the Cyber Essentials
initiative becoming a staple in the way of cyber security, the overall cyber crimes awareness has risen
greatly in comparison to what it was in the not-so-distant past. Nowadays, having your company undergo
such a test is a great way to express your concern about your customer’s data. However, they will not
make your system impervious to attacks and it's important that you know what types of cyber crimes you
can fall victim to and what can happen as a result.
Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP
www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053
Page |2
Cyber Crimes Definition
Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP
www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053
Page |3
Cyber crimes are a type of criminal activity conducted via the Internet,
where an individual or a group of individuals aim to disturb the way in which your
systems function, steal sensitive information or otherwise prevent your company
from conducting its business. Just like with real life crimes, the motives can vary
between cases – begrudged employees, ex-employees, financial motivations, etc.
There are many different types of cyber crimes that you can fall victim to and we’re
going to go over three of the most common ones – Malware, Distributed Denial of
Service attacks and Phishing attempts.
Cyber Crimes Often Lead to Loss of Data - Malware
Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP
www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053
Page |4
One of the more dangerous types of malware that has been
gaining popularity recently is ransomware. Ransomware and crypto-
viruses are mostly targeted at companies that handle large amounts of
data and work with sensitive information. These attacks often result in
losing access to certain or in some cases all of your files, websites,
digital storages and so on. Cyber crimes of this type are usually
committed by groups or individuals that are mostly after money, as
shortly after, the perpetrator(s) tend to send threatening messages,
demanding a certain ransom that you’d have to pay in order to regain
access to your files.
All it takes is downloading a piece of software from an
untrusted source and running it. This type of cyber crimes work
extremely quickly and can set their hooks into your system in the
manner of seconds. After that point, everything can only go
downhill and you should seek the aid of specialists ASAP.
Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP
www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053
Page |5
How can you fall victim to this type of cyber
crimes?
How to prevent this?
Cyber crimes statistics show that this type of activity is quickly
gaining popularity and as such, it’s crucial to make sure that you’re
protected against it. Never, ever download anything from an untrusted
source. Better yet, make sure that everyone in your company is well
aware of this threat and prohibit visits to untrusted websites from
inside your company. There’s a few steps that you should take to
protect your company from this type of cyber crime. First of all, keep
your OS (Windows) or your MAC up to date – software often comes
with vulnerable sides and all these updates that Microsoft keeps
releasing serve to plug the holes. Then, make sure that you are using
a good mail filtering system as it will greatly reduce the amount of
unwanted messages that can reach your company. Finally, employee
awareness is key.
Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP
www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053
Page |6
Cyber Crimes Resulting in Denial of Service -
DDoS Attacks
Another very prominent type of cyber attacks that is also
getting more and more popular is the DDoS attack. These types
of cyber crimes are usually done with proving a point or gaining
publicity in a certain manner in mind. They tend to overload
servers and internet connections, denying given servers the
ability to operate as intended. While there are preventive
measures that can be taken against this, there is only so much
that can be done beyond careful filtering and having things to fall
back upon.
Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP
www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053
Page |7
How can you fall victim to this type of cyber
crimes?
Falling victim to DDoS attacks is rarely the fault of employees or
businesses directly, as they aren’t related to downloading or
clicking in specific places, it’s mostly up to the perpetrators
desire to mess with the given servers as a means of achieving a
personal goal.
Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP
www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053
Page |8
How to prevent this?
Cyber crimes statistics can show that the complete and total
prevention of DDoS attacks isn’t in the realm of possibility, due to the
sheer amount of data that a group of individuals can direct at a server,
given enough time, effort and desire. However, there are tools to
mitigate the damage and with the help of specialized software and
companies, your business can be protected against the weaker
attacks.
Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP
www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053
Page |9
Cyber Crimes Evolve but Never Completely
Change – E-mail Spam & Phishing
Finally, email spam is almost as popular as it's been in
the past and email phishing keeps on going, without giving any
indication about running out of steam anytime soon. Very often,
people receive email from unverified and suspicious sources,
containing messages and information, compelling them to visit a
certain site and enter their personal data in some type of form.
Falling victim to these types of cyber crimes can lead to having
certain sensitive information floating around in the internet, often
connected to significant financial losses.
Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP
www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053
Page |10
How can you fall victim to this type of cyber
crimes?
Following links to strange looking sites, filling in personal information
without making sure that the web page asking for it is authentic and lack of
overall use awareness are the most common problems that can put one in a
situation where they can become victims of phishing.
Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP
www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053
Page |11
How to prevent this?
According to cyber crimes statistics preventing the success of
phishing attempts is simpler than combating most other types of cyber crimes
as your strongest weapon here is employee awareness and knowledge. One
should always carefully look and think before they click on a link, checking
where they will be led to and what the page in question asks for once they
arrive. Spam filters are also evolving to help better with filtering incoming
messages, preventing a decent portion of the malicious one from reaching
you.
Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP
www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053
Page |12
These are just a few of the most common types of cyber crimes
nowadays and it can be quite difficult to keep track of everything, staying up
to date. However, that’s exactly what a cyber criminal wants – you getting
tired of the whole process, giving him the opportunity to get into your system
and cause harm. Of course, nobody is expected to deal with the war against
cyber crimes their own – that’s why there are so many companies
specializing in cyber protection. However, this can potentially end up being a
double edged sword as it can also be used as the perfect cover for someone
who wishes to infiltrate your defenses. And it’s much easier to commit cyber
crimes when you have direct access to a computer from the inside of a
company’s network. Do your research before you hire a company to take care
of your cyber defense to avoid headaches afterwards.
Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP
www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053
Page |13
Thank You
Go Live UK Ltd
52 Great Eastern Street
London, EC2A 3EP
www.goliveuk.com
Е. info@goliveuk.com
T. 020 77299 330
F. 087 00941 053

More Related Content

More from Go Live UK

Schema org Attributes | What is schema | Benefits Of Schema org
Schema org Attributes | What is schema | Benefits Of Schema orgSchema org Attributes | What is schema | Benefits Of Schema org
Schema org Attributes | What is schema | Benefits Of Schema orgGo Live UK
 
Almost Flat Design: What does the Future hold?
Almost Flat Design: What does the Future hold?Almost Flat Design: What does the Future hold?
Almost Flat Design: What does the Future hold?Go Live UK
 
CAN BRANDING AFFECT YOUR MARKETING STRATEGY OR YOUR GOOGLE RANKING?
CAN BRANDING AFFECT YOUR MARKETING STRATEGY OR YOUR GOOGLE RANKING?CAN BRANDING AFFECT YOUR MARKETING STRATEGY OR YOUR GOOGLE RANKING?
CAN BRANDING AFFECT YOUR MARKETING STRATEGY OR YOUR GOOGLE RANKING?Go Live UK
 
ONLINE BUSINESS PRESENCE WITH GOVERNMENT FUNDING
ONLINE BUSINESS PRESENCE WITH GOVERNMENT FUNDINGONLINE BUSINESS PRESENCE WITH GOVERNMENT FUNDING
ONLINE BUSINESS PRESENCE WITH GOVERNMENT FUNDINGGo Live UK
 
Search Engine Marketing
Search Engine MarketingSearch Engine Marketing
Search Engine MarketingGo Live UK
 
Social Media Marketing
Social Media MarketingSocial Media Marketing
Social Media MarketingGo Live UK
 
Golive UK E-Commerce
Golive UK  E-CommerceGolive UK  E-Commerce
Golive UK E-CommerceGo Live UK
 

More from Go Live UK (7)

Schema org Attributes | What is schema | Benefits Of Schema org
Schema org Attributes | What is schema | Benefits Of Schema orgSchema org Attributes | What is schema | Benefits Of Schema org
Schema org Attributes | What is schema | Benefits Of Schema org
 
Almost Flat Design: What does the Future hold?
Almost Flat Design: What does the Future hold?Almost Flat Design: What does the Future hold?
Almost Flat Design: What does the Future hold?
 
CAN BRANDING AFFECT YOUR MARKETING STRATEGY OR YOUR GOOGLE RANKING?
CAN BRANDING AFFECT YOUR MARKETING STRATEGY OR YOUR GOOGLE RANKING?CAN BRANDING AFFECT YOUR MARKETING STRATEGY OR YOUR GOOGLE RANKING?
CAN BRANDING AFFECT YOUR MARKETING STRATEGY OR YOUR GOOGLE RANKING?
 
ONLINE BUSINESS PRESENCE WITH GOVERNMENT FUNDING
ONLINE BUSINESS PRESENCE WITH GOVERNMENT FUNDINGONLINE BUSINESS PRESENCE WITH GOVERNMENT FUNDING
ONLINE BUSINESS PRESENCE WITH GOVERNMENT FUNDING
 
Search Engine Marketing
Search Engine MarketingSearch Engine Marketing
Search Engine Marketing
 
Social Media Marketing
Social Media MarketingSocial Media Marketing
Social Media Marketing
 
Golive UK E-Commerce
Golive UK  E-CommerceGolive UK  E-Commerce
Golive UK E-Commerce
 

Recently uploaded

Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 

Recently uploaded (20)

Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 

Cyber Crimes and the Threat They Pose to Your Business

  • 1. Presented by Ivan Yordanov Cyber Crimes and the Threat They Pose to Your Business Go Live UK Ltd 52 Great Eastern Street London, EC2A 3EP www.goliveuk.com Е. info@goliveuk.com T. 020 77299 330 F. 087 00941 053
  • 2. Regardless of whether you own a small, family sized business or a large company with lots of employees, nobody is invulnerable to attacks on the Internet. With things such as the Cyber Essentials initiative becoming a staple in the way of cyber security, the overall cyber crimes awareness has risen greatly in comparison to what it was in the not-so-distant past. Nowadays, having your company undergo such a test is a great way to express your concern about your customer’s data. However, they will not make your system impervious to attacks and it's important that you know what types of cyber crimes you can fall victim to and what can happen as a result. Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053 Page |2
  • 3. Cyber Crimes Definition Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053 Page |3 Cyber crimes are a type of criminal activity conducted via the Internet, where an individual or a group of individuals aim to disturb the way in which your systems function, steal sensitive information or otherwise prevent your company from conducting its business. Just like with real life crimes, the motives can vary between cases – begrudged employees, ex-employees, financial motivations, etc. There are many different types of cyber crimes that you can fall victim to and we’re going to go over three of the most common ones – Malware, Distributed Denial of Service attacks and Phishing attempts.
  • 4. Cyber Crimes Often Lead to Loss of Data - Malware Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053 Page |4 One of the more dangerous types of malware that has been gaining popularity recently is ransomware. Ransomware and crypto- viruses are mostly targeted at companies that handle large amounts of data and work with sensitive information. These attacks often result in losing access to certain or in some cases all of your files, websites, digital storages and so on. Cyber crimes of this type are usually committed by groups or individuals that are mostly after money, as shortly after, the perpetrator(s) tend to send threatening messages, demanding a certain ransom that you’d have to pay in order to regain access to your files.
  • 5. All it takes is downloading a piece of software from an untrusted source and running it. This type of cyber crimes work extremely quickly and can set their hooks into your system in the manner of seconds. After that point, everything can only go downhill and you should seek the aid of specialists ASAP. Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053 Page |5 How can you fall victim to this type of cyber crimes?
  • 6. How to prevent this? Cyber crimes statistics show that this type of activity is quickly gaining popularity and as such, it’s crucial to make sure that you’re protected against it. Never, ever download anything from an untrusted source. Better yet, make sure that everyone in your company is well aware of this threat and prohibit visits to untrusted websites from inside your company. There’s a few steps that you should take to protect your company from this type of cyber crime. First of all, keep your OS (Windows) or your MAC up to date – software often comes with vulnerable sides and all these updates that Microsoft keeps releasing serve to plug the holes. Then, make sure that you are using a good mail filtering system as it will greatly reduce the amount of unwanted messages that can reach your company. Finally, employee awareness is key. Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053 Page |6
  • 7. Cyber Crimes Resulting in Denial of Service - DDoS Attacks Another very prominent type of cyber attacks that is also getting more and more popular is the DDoS attack. These types of cyber crimes are usually done with proving a point or gaining publicity in a certain manner in mind. They tend to overload servers and internet connections, denying given servers the ability to operate as intended. While there are preventive measures that can be taken against this, there is only so much that can be done beyond careful filtering and having things to fall back upon. Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053 Page |7
  • 8. How can you fall victim to this type of cyber crimes? Falling victim to DDoS attacks is rarely the fault of employees or businesses directly, as they aren’t related to downloading or clicking in specific places, it’s mostly up to the perpetrators desire to mess with the given servers as a means of achieving a personal goal. Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053 Page |8
  • 9. How to prevent this? Cyber crimes statistics can show that the complete and total prevention of DDoS attacks isn’t in the realm of possibility, due to the sheer amount of data that a group of individuals can direct at a server, given enough time, effort and desire. However, there are tools to mitigate the damage and with the help of specialized software and companies, your business can be protected against the weaker attacks. Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053 Page |9
  • 10. Cyber Crimes Evolve but Never Completely Change – E-mail Spam & Phishing Finally, email spam is almost as popular as it's been in the past and email phishing keeps on going, without giving any indication about running out of steam anytime soon. Very often, people receive email from unverified and suspicious sources, containing messages and information, compelling them to visit a certain site and enter their personal data in some type of form. Falling victim to these types of cyber crimes can lead to having certain sensitive information floating around in the internet, often connected to significant financial losses. Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053 Page |10
  • 11. How can you fall victim to this type of cyber crimes? Following links to strange looking sites, filling in personal information without making sure that the web page asking for it is authentic and lack of overall use awareness are the most common problems that can put one in a situation where they can become victims of phishing. Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053 Page |11
  • 12. How to prevent this? According to cyber crimes statistics preventing the success of phishing attempts is simpler than combating most other types of cyber crimes as your strongest weapon here is employee awareness and knowledge. One should always carefully look and think before they click on a link, checking where they will be led to and what the page in question asks for once they arrive. Spam filters are also evolving to help better with filtering incoming messages, preventing a decent portion of the malicious one from reaching you. Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053 Page |12
  • 13. These are just a few of the most common types of cyber crimes nowadays and it can be quite difficult to keep track of everything, staying up to date. However, that’s exactly what a cyber criminal wants – you getting tired of the whole process, giving him the opportunity to get into your system and cause harm. Of course, nobody is expected to deal with the war against cyber crimes their own – that’s why there are so many companies specializing in cyber protection. However, this can potentially end up being a double edged sword as it can also be used as the perfect cover for someone who wishes to infiltrate your defenses. And it’s much easier to commit cyber crimes when you have direct access to a computer from the inside of a company’s network. Do your research before you hire a company to take care of your cyber defense to avoid headaches afterwards. Address: Go Live UK Ltd, 52 Great Eastern Street, London, EC2A 3EP www.goliveuk.com, Е. info@goliveuk.com, T. 020 77299 330, F. 087 00941 053 Page |13
  • 14. Thank You Go Live UK Ltd 52 Great Eastern Street London, EC2A 3EP www.goliveuk.com Е. info@goliveuk.com T. 020 77299 330 F. 087 00941 053