We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.

croom new

Preferred Blog

Preferred has been serving the Tinley Park area since 1991, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the Current Cybercrime Statistics

Taking a Look at the Current Cybercrime Statistics

Organizational cybersecurity has to be a priority for every business. These days, companies are getting hacked left and right and being exposed to some of the very worst malware ever created. Today, we will take a look at some cybercrime statistics that will put in perspective just how damaging cybercrime is.

Ransomware Attacks

Ransomware is the kind of malware attack where the malware locks down files or whole computing systems while the perpetrators demand payment to unencrypt them. Victims are given a deadline to pay the ransom by. If no payment is made, ransomware-encrypted files will be destroyed. Some of the worst ones include Cryptolocker, WannaCry, and Petya. 

In 2019, we saw businesses fall victim to ransomware once every 15 seconds, to the tune of $11.5 billion in losses. 66 percent of companies that were affected by ransomware cited spam and phishing as the predominant manners of deployment. What’s remarkable is that nearly half of surveyed companies (48 percent) had been affected by ransomware in some way in 2017.

Denial of Service Attacks

Denial of Service (DoS) attacks and their more popular cousin, the Distributed Denial of Service (DDoS) attack are extremely common. In fact, they are the most common type of cyber attack.  To carry out a DDoS attack hackers will use automated resources to flood a target with the aim to take them down. Today, with the amount of Internet of Things devices that are present, the DDoS attacker can gain access to these devices and have them all access the same webpage at once. The amount of traffic takes down the website.

March 5, 2018 saw the biggest DDoS attack in history, which was clocked at a whopping 1.7 TB/s; and, fortunately for the ISP that was being hacked, wasn’t successful at taking the company offline. The average cost of a DDoS attack averages between $20K-to-$40K per hour, or slightly less than what the average American worker makes per year. More than that, DDoS attacks cost UK businesses over £1 billion in 2019.

Man-in-the-Middle Attacks

When you are a victim of a Man-in-the-Middle, the integrity of any communications you are having with another entity has been compromised. This means that any personal data, financial information, or business correspondence can be intercepted, redirected, or changed and sent through. The negative situations of this type of hack are about limitless; and, since the man-in-the-middle attacks are comparatively simple to conduct, more and more are taking place each day. 

Most servers are still vulnerable to this kind of hack. In fact, as of 2016, 95 percent of HTTPS servers were still under threat from MitM attacks. The main reason they are deployed is to get personal or business information that isn’t readily available. This includes login credentials, bank transfer information, or payment card information. 

Email Spam (Phishing)

Today, the biggest threat to any company is the phishing attack. A phishing attack is a form of social engineering where hackers create correspondence of some sort (email, instant messages, social media posts, etc.)  with the aim of gaining access to secure computing systems through user manipulation. The phishing email has been around a long time, but today’s phishing methods are more thorough and targeted than ever before. 

The statistics of phishing emails are eye-opening. 70 percent of governmental network breaches are the result of phishing. 93 percent of all social engineering attacks were phishing. 64 percent of all organizations have experienced some form of phishing attack in the past 12 months, including 82 percent of manufacturers. 21 percent of ransomware comes via phishing. What’s worse, 30 percent of phishing messages were opened in 2016.

SQL Injection Attack

A structured query language injection is an attack where malicious code is inserted into your SQL servers and gives the hacker the information hosted on your databases. This hack has been around for a long time, but now with new web-based applications that require database access, hackers have been reaching into their little bag of tricks and turning up valuable information. 

Today, SQL injection accounts for 65 percent of all web application attacks.That means that if your business has a website (or an app) that draws information from a database (most do), a SQL injection hack can be devastating for you. Even gamers have to be careful as 12 billion of the 55 billion SQL injection hacks found by the security experts at Akamai targeted the gaming community. 

Malware

After all these other attacks, you wouldn’t think that there would be time for these hackers to perpetrate more damage. You’re wrong. One of the worst, and most prevalent, attacks against businesses are malware attacks. Malware comes in many forms. Some include: 

  • Trojan horses - Code that hides inside other applications and gives hackers an “in” to a computing network
  • Worms - Individual applications that propagate across computers and networks. 
  • Viruses - Infects applications with malicious code, stealing data, computing resources, and more.
  • Spyware - A seemingly benign code, often attached to software to collect information about the user behavior on a machine or network.

This code gets onto your systems several ways. Malware can be deployed in a phishing message, but most times it is delivered through what are called droppers. Droppers are programs specifically designed  to install viruses on computers. Since most droppers aren’t malicious themselves, cyber security protections don’t flag them as malicious. 

Would you like to know more about how to protect your network and infrastructure from the millions of threats that are actively targeting your business? Call the IT professionals at Preferred today at 708-781-7110.

Tip of the Week: Activate Microsoft’s Two-Step Ver...
Tech Giants Are in on AR
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Friday, November 22 2024

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Latest Blog Entry

      Businesses of every size need to prioritize their security. This fact has not changed and will not change anytime soon. What has changed, however, are the recommended ways to approach this security. Today, we wanted to review the history of today’s predominant cybersecurity ...

      Latest News

      Best Places to Work - 5 YEARS STRONG!!

      Preferred is once again, honored for being a Best Place to Work for the fifth straight year!  Our team is what makes Preferred a Best Place to Work.  

      Daily Herald Suburban Business 2024 Best Places to Work Honorees The Daily Herald Suburban Business has announced the names of 51 companies, in 5 categories of competition, that are honored as the 2024 Best Places to Work in Illinois. This statewide survey and awards program was designed to identify, recognize and honor the best places of employment in Illinois, benefiting the state's economy, its workforce and businesses.