5 Tricks Cybercriminals Use To Hack Your Computer Network

by Gary Cox

4The world is full of cybercriminals. They penetrate complicated data structures of huge credit-monitoring companies and snatch personal information from millions of people. They release sensitive customer data from discrete businesses to the public. They spy on celebrities through webcams, lock down public utility systems like the German railway and steal thousands of gigabytes of information from high-profile government entities like the CIA.

Cybercriminals also target small businesses like yours — and extort them for thousands of shillings. Having a dedicated security team equipped with the most up-to-date technology is critical — but it’s not enough. You must stay informed.

So, let’s take a look at the five most common ways cybercriminals infiltrate a network.

The 5 Most Common Cyber crimes

  1. Phishing Scams

Phishing is an age-old cyber crime. If you’ve ever received an email from a “Nigerian prince” asking for money, you’ve been targeted with a phishing scam.

Most phishing scams work like this: You receive an email from a “high-ranking employee” with whom you’ve been working on a project. The email instructs you to click on a link so the sender can access “vital information” for the project.

When you click on the link, it rapidly installs malware on your computer which spreads through your network and locks out everyone in the company.

Whilst most phishing emails are easy to spot, they’re becoming increasingly sophisticated. As Thomas Peters writes for “Newsweek,” “The best messages look like they’re trying to protect the company.”

For example, one well-meaning system administrator opened a PDF titled, “How to Avoid a Phishing Attack.” It spread malware to the company server! How’s that for irony?

  1. Social Engineering

Social engineering is a type of hacking that uses real people to carry out an attack, rather than intricate lines of code.

Social engineers call you pretending they’re someone else and try to get emails, passwords, and other information from you that they can later use for an attack.

So what does social engineering look like? Here’s an example: Your IT guy receives a call from the “secretary” of one of your clients. She says she’s experiencing problems with your service due to a firewall.

Convinced, your IT professional alters the firewall to accommodate the “secretary.” Before you know it, a cybercriminal has access to your entire security system, or lack thereof.

  1. Password Hacking

Despite your best efforts, it doesn’t take much for a cybercriminal to obtain company passwords.

Hackers are great at guessing easy passwords, but even clever and complicated ones filled with exclamation points and random numbers are accessible too.

You know those “security” questions that allow you to reset a password? Like, “What was the name of your first dog?” or “When is your anniversary?” Cybercriminals can easily find answers to those through social engineering or social media and hack into business critical accounts.

  1. Fault Injection

Fault injection is when sophisticated hackers scan your business’s network or software source code for weak points.

Once located, hackers target weak points to deliver viruses, redirect website links to malware and crash your system.

  1. USB-based Malware

Some hackers hand out USB sticks with malware on them in hopes you’ll stick one into your computer. Be wary of the USB sticks you’re handed at conferences or other industry events. Never use a USB stick if you don’t know its origin.

So with so many cyber threats out there, how do you protect yourself?

How to Protect Yourself From Cyber crime

Knowing the strategies hackers deploy is only half the battle. Cyber crime techniques are constantly changing — it’s impossible to keep up by yourself.

Call us on 072-898-0362 to answer your questions or to provide Computer and IT Support, we would be happy to hear from you. We at GCComp have the experience and technical knowledge to help you with your technology issues “We know technology so you don’t have to”.


Published by Coxy

A confident and talented IT technician with extensive practical experience of working with computers and resolving any support issues that are raised to him. Possessing a proven ability to administer and control the operation, configuration and maintenance of computer based information systems, as well as having an eye for detail and able to multi-task under pressure.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: