• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » Corporate Cyber Threats » Top 9 Cyber Threats for Businesses

Top 9 Cyber Threats for Businesses

2019-10-03 by Michelle Dvorak

Cyber Threats Businesses

Top Cyber Threats for Businesses – Ransomware, BEC Scams, Social Engineering, Phishing Emails, Tax Cyber Threats All Threaten Businesses

The Federal Bureau of Investigations issued a Public Service announcement warning the public about the increasing threat of ransomware to businesses and healthcare organizations. Hackers have attacked smaller municipalities, major cities like Baltimore with expensive ransomware attacks.

All businesses depend on the security of their systems, networks, websites, emails, and most importantly their data. A cyber threat puts every aspect of your business in danger.

Ransomware

Ransomware attacks are a form of cyber attack in which a malware takes control of a computer or servers and blocks access to files, devices, or the entire IT network until a ransom is paid. Ransomware attacks have been on the rise in one day in 2019 twenty-three government agencies in the state of Texas where infected with ransomware attack. The FBI warned that hackers are now targeting healthcare organizations with ransomware.

There is no guarantee that the system will be returned to its rightful owner if the ransom is paid.

RELATED: What is Ransomware?

BEC Scam

Business email compromise, or BEC, scams are a type of corporate fraud where a hacker impersonates an employee, compromises an email account, or steals employee data. Generally, the goal of a BEC scam is to steal money or conduct identity theft. BEC scams can affect a company of any size. In 2018 hackers stole over 1.3 billion dollars from companies using BEC scams. A Common BEC scam is to send a fraudulent invoice to someone in a company who is responsible for accounts payable. Often the contact information for the accounts payable employee is acquired during a previous social engineering attack or phishing email campaign. Tax fraud or W2 scams are types of BEC scams.

FREE 5.11 Tactical $99 Side Trip Bag with $199+ purchase. Use Code FREEBAG19
While Supplies Last

Often hackers compromise a corporate email account by resetting passwords. The hacker then sends an email from a legitimate corporate account to someone responsible for payments. A tricked employee who is received a legitimate looking invoice from an actual corporate email account may be fooled into transferring money to the hacker to pay the invoice.

What is a BEC Scam?

Phishing Email Scams

Phishing emails are malicious emails sent to a victim with the goal I’m getting the victim to click on a link, download a file, go to a spoof website, or take other fraudulent action. The hacker may want to infect the victim’s computer with malware, steal money by tricking the recipient into entering in banking credentials, or steal sensitive corporate data to use in further cyber attacks.

Malware Attacks

Malware is any unwanted software app including adware, spyware, ransomware, worms, RAT malware, or computer virus. Malware is used to spy on a victim’s computer or an entire IT network. Malware can also be used to steal login credentials or financial information. It can also be used to gain access to other hardware or computers attached to the same network or to download more malware. Ransomware is a form of malware that controls access to infected computers and holds access until a ransom is paid. Adware is a type of malware that shows advertisements on a device to earn money through clicks.

READ: 5 Phishing Email Examples

Industrial Espionage

Industrial Espionage or spying is carried out by organized and skilled hacking groups known as advanced persistent threat (APT) groups. APT hacking groups often work at the behest a foreign government. APT groups attack with a low and slow approach to hacking. They infiltrate and spy on corporate computers and networks to learn as much about the devices connected to the network and gain administrative access. APR groups also conduct industrial espionage to spy on corporate trade secrets, steal money, infect other machines and servers connected to a corporate network.

Get out, stay out! SAVE when you purchase the BioLite Energy Bundle+
Includes everything you need to feel at home while off-grid

Tax Fraud

Business tax fraud involves a hacker or scammer tricking a corporate employee into sending employee federal W2s or other tax forms. Tax fraud often begins with a phishing email. The hacker convinces a human resource employee to send one or more employee tax forms to an account controlled by the hacker. Because the tax forms contain personal information like names, addresses, and government identification numbers tax fraud results in identity theft. Tax fraud often begins with a spear phishing email.

RELATED: What are Advanced Persistent Threat Groups?

Social Engineering Attacks

Social engineering is a tactic used by hackers to learn more information about a potential target. Social engineering is when a hacker gathers information about employees including names, email addresses, and job titles from publicly available online resources. Hackers get this information from corporate websites and social media accounts like LinkedIn and Facebook. The hacker then uses the personal information to send targeted spear phishing emails.

The personalized nature of the information contained in the email makes it seem as though the phishing email is coming from someone who is familiar to the recipient. Because the recipient is convinced, they know the sender, they’re more likely to follow the instructions in the scam email.

Social media accounts often contain the answers to common password reset questions. The answers to password reset questions combined with an email address can be used to hack into more sensitive accounts like credit cards, banks and corporate emails.

Identity Theft

Identity theft is one of the top forms of scams identified by the Federal Trade Commission. Identity theft occurs when a hacker steals a person’s name address government identification numbers and other personal information. The hacker opens financial accounts in the name of the victim. And identity theft victim might find that there are credit cards, car loans, and even mortgages opened in their name.

Unpatched Software or Hardware

Unpatched software and Hardware can easily result and malware ransomware and other cyber tax spreading across an entire corporate Network easily. The 2018 malware attack known as one guy spread easily across Europe and Asia because hundreds of thousands of Windows computers, we’re not kept up-to-date with the latest security patches.

Patching apps software and Hardware is one of the easiest ways to protect your corporate data devices and network from hackers.

Filed Under: Corporate Cyber Threats Tagged With: phishing email, ransomware

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version