fbpx

Cyber Threats – What are the common threat types?

Man in hoodie and a mask pointing at camera while he hacks into a office IT system
The cyber threat to Australian individuals and organisations is undeniable, unrelenting and continues to grow.

You could be a target even if you don’t think the information held on your networks is valuable, or that your business would be of interest to cyber adversaries.

Many organisations are at risk purely because they are vulnerable through unpatched software or unaware staff members.

Common threats impacting Australians include

Malware

Malware is software that cyber criminals use to harm your computer system or network. Cyber criminals can use malware to gain access to your computer without you knowing, in targeted or broad-based attacks.

Ransomware

Ransomware is a type of malware that denies access to files or computer systems until a ransom is paid.

Distributed denial of service

A distributed denial of service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic.

Unauthorised cryptomining

Cryptocurrency mining (cryptomining) software uses a system’s processing power to solve complex mathematical problems, in return for a type of digital currency.

Unauthorised cryptocurrency mining (also known as cryptojacking) is where a website or software on your computer does this cryptocurrency mining without your authorisation. It is now the most popular cyber attack method.

You could be a target even if you don’t think the information held on your networks is valuable, or that your business would be of interest to cyber adversaries.

Malicious insiders

Malicious insiders are people such as employees, former employees, contactors or business associates who have inside information on your computer system, data or security, and access it for their own purposes.

Identity theft

Identity theft is when a cybercriminal gains access to your personal information to steal money or gain other benefits.

Phishing

Phishing is a method of stealing confidential information by sending fraudulent messages to a victim. It is one of the most prevalent scams reported in Australia.

Email scams

Criminals use email to manipulate or trick you into unintentionally sharing personal information, financial details, or money.

Phone call scams

There are many ways scammers try to get your information or money over the phone. They will usually pretend to be from a well-known organisation, such as a government agency, a utilities provider, Australia Post, a bank or the police. They can be incredibly convincing.

Dating and romance scams

Scammers often approach their victims on legitimate dating websites before attempting to move the ‘relationship’ away from the safeguards that these sites put in place, for example, by communicating through other methods such as email, where they can more easily manipulate victims.

Unauthorised cryptocurrency mining (also known as cryptojacking) is where a website or software on your computer does this cryptocurrency mining without your authorisation. It is now the most popular cyber attack method.

Secondary Targeting

Secondary targeting is where cyber adversaries try to gain access to networks of companies that provide products or services (e.g. through outsourcing arrangements) as a means to get to their higher value customers.

Prevention

Prevention is far better than cure. Ensuring your network is configured and aligned in line with the Australian Government’s “essential 8” recommendations is the bare minimum required.

Utilising an external IT support company that specialises in cyber security is also a good idea. Domain Digital not only specialises in preventative measures and ongoing, proactive day to day support of your system, we also have a cyber security education and training platform that can assist you and your staff form ever being “caught out”. Simply visit www.domaindigital.com.au or call (08) 9441 6300 to find out more.

Do you need a reliable IT service?

Enquire through the form to get started with your business IT solution. 

Free Network and Cyber Security Assessment

Book a Free 30-Minute Call to Identify Your Security Problem