{"id":427,"date":"2017-12-06T11:42:49","date_gmt":"2017-12-06T11:42:49","guid":{"rendered":"http:\/\/sugarshotlive.wpengine.com\/?p=427"},"modified":"2023-05-11T09:13:08","modified_gmt":"2023-05-11T09:13:08","slug":"5-tricks-cybercriminals-use-to-hack-your-computer-network","status":"publish","type":"post","link":"https:\/\/www.sugarshot.io\/5-tricks-cybercriminals-use-to-hack-your-computer-network\/","title":{"rendered":"5 Tricks Cybercriminals Use To Hack Your Computer Network"},"content":{"rendered":"<p>The world is full of cybercriminals. They penetrate complicated data structures of huge credit-monitoring companies like Equifax and snatch personal information from millions of people. They release sensitive customer data from discreet businesses like Ashley Madison to the public. They spy on celebrities through\u00a0webcams, lock down public utility systems like the German railway and steal thousands of gigabytes of information from high-profile government entities like the CIA. \u00a0 Cybercriminals also target small businesses like yours \u2014 and extort them for thousands of dollars.\u00a0Having a dedicated security team equipped with the most up-to-date technology is critical \u2014 but it&#8217;s not enough. You\u00a0must stay informed. \u00a0 So, let&#8217;s take a look at the five most common ways cybercriminals infiltrate a network.<\/p>\n<h2>The 5 Most Common Cybercrimes<\/h2>\n<h2>1. Phishing Scams<\/h2>\n<p>Phishing is an age old cyber crime. If you&#8217;ve ever recevied an email from a &#8220;Nigerian prince&#8221; asking for money, you&#8217;ve been targeted with a phishing scam. \u00a0 Most phising scams work like this:\u00a0You receive an email from a &#8220;high-ranking employee&#8221; with whom you\u2019ve been\u00a0working on a project. The email instructs you to click on a link so the sender can access \u201cvital information\u201d for the project. \u00a0 When you click on the link, it rapidly installs malware on your computer which spreads through your network and locks out everyone in the company. \u00a0 While most phishing emails are easy to spot, they&#8217;re becoming increasingly sophisticated. As Thomas Peters writes for \u201cNewsweek,\u201d \u201cThe best messages look like they\u2019re trying to protect the company.&#8221; \u00a0 For example, one well-meaning system administrator opened a PDF titled, &#8220;How to Avoid a Phishing Attack.&#8221; It\u00a0 spread malware to the company server! How\u2019s that for irony?<\/p>\n<h2>2. Social Engineering<\/h2>\n<p>Social engineering is a type of hacking that uses real people to carry out an attack, rather than intricate lines of code. \u00a0 Social engineers call you pretending they&#8217;re someone else and try to get emails, passwords, and other information from you that they can later use for an attack. \u00a0 So what does social engineering look like? Here&#8217;s an example: Your IT guy receives a call from the \u201csecretary\u201d of one of your clients. She says she&#8217;s experiencing problems with your\u00a0service due to a firewall. \u00a0 Convinced, your IT professional alters the firewall to accommondate the &#8220;secretary.&#8221; Before you know it, a cybercriminal has access to your entire security system, or lack thereof.<\/p>\n<h2>3. Password Hacking<\/h2>\n<p>Despite your best efforts, it doesn&#8217;t take much for a cybercriminal to obtain company passwords. \u00a0 Hackers are great at guessing easy passwords, but even clever and complicated ones filled with exclamation points and random numbers are accessible too. \u00a0 You know those &#8220;security&#8221; questions that allow you to reset a password? Like, &#8220;What was the name of your first dog?&#8221; or &#8220;When is your anniversary?&#8221; Cybercriminals can easily find answers to those through social engineering or social media and hack into business critical accounts.<\/p>\n<h2>4. Fault Injection<\/h2>\n<p>Fault injection is when sophisticated hackers scan your business\u2019s network or software source code for weak points. \u00a0 Once\u00a0located, hackers target weak points to deliver viruses, redirect website links to malware and crash your system.<\/p>\n<h2>5. USB-based Malware<\/h2>\n<p>Some hackers hand out USB sticks with malware on them in hopes you&#8217;ll stick one into your computer. Be wary of the USB sticks you&#8217;re handed at conferences or other industry events.\u00a0Never use a USB stick if you don&#8217;t know its origin. \u00a0 So with so many cyberthreats out there, how do you protect yourself?<\/p>\n<h2>How To Protect Yourself From Cybercrime<\/h2>\n<p>Knowing the strategies hackers deploy is only half the battle. Cybercrime techniques are constantly changing \u2014 it\u2019s impossible to keep\u00a0up by yourself. \u00a0 At SugarShot, we want to help. Download the FREE chapter, &#8220;<a href=\"https:\/\/info.csgsupport.net\/sitting-duck-free-chapter?__hstc=127814098.66b452fa5bed746a62a1f511471fc27f.1545997101603.1546942901393.1547032021143.5&amp;__hssc=127814098.6.1547032021143&amp;__hsfp=3218203659\">I&#8217;ve Been Hacked! What Should I Do?<\/a>&#8221; from our eBook, <em><strong>Sitting Duck &#8211; Why YOUR Business Is A Cybercriminal&#8217;s Ideal Target<\/strong>.<\/em> We discuss what to do if you&#8217;ve been hacked and how to prevent cyber attacks in the future. \u00a0 <strong>If you have any questions about <a href=\"http:\/\/www.csgsupport.net\/services\/it-consulting-los-angeles\/it-security-services-los-angeles\/?__hstc=127814098.66b452fa5bed746a62a1f511471fc27f.1545997101603.1546942901393.1547032021143.5&amp;__hssc=127814098.6.1547032021143&amp;__hsfp=3218203659\" target=\"_blank\" rel=\"noopener\">cybersecurity<\/a>, <a href=\"http:\/\/www.csgsupport.net\/contact-us\/?__hstc=127814098.66b452fa5bed746a62a1f511471fc27f.1545997101603.1546942901393.1547032021143.5&amp;__hssc=127814098.6.1547032021143&amp;__hsfp=3218203659\">contact SugarShot today!<\/a><\/strong> \u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"The world is full of cybercriminals. They penetrate complicated data structures of huge credit-monitoring companies like Equifax and snatch personal information from millions of people. They release sensitive customer data from discreet businesses like Ashley Madison to the public.","protected":false},"author":2,"featured_media":428,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[6,1,7],"tags":[5,26,16],"class_list":["post-427","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-msp-advice","category-technology","tag-cyber-security","tag-cyberattack","tag-cybercrime"],"_links":{"self":[{"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/posts\/427","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/comments?post=427"}],"version-history":[{"count":0,"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/posts\/427\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/media\/428"}],"wp:attachment":[{"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/media?parent=427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/categories?post=427"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sugarshot.io\/api\/wp\/v2\/tags?post=427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}