Skip to the content

Flint Tech Solutions

  • Home
  • About Us
  • Services
    • Managed Services
    • Risk Management
    • CIO & CISO Consulting
    • Add-On Services
  • Testimonial
  • Resources
  • Contact Us
  • Remote Support

Tag: Colonial Pipeline attack

Flint Tech’s Cybersecurity Awareness Series: Denial of Service Attacks

Home / Flint Tech’s Cybersecurity Awareness Series: Denial of Service Attacks
Categories
Flint Tech’s Cybersecurity Awareness Series: Denial of Service Attacks
  • Post author By Anastasia Wilson
  • Post date October 20, 2021
credit: Image by Naga raju from Pixabay

Thanks for reading this month! We hope you’re learning more about cybersecurity. As you’ve hopefully observed, it’s never been more important for businesses to have an effective security plan.

Let’s get back at it with the next type of threat on the list: Denial of Service (DOS) Attacks.

credit: Tenor.com

Yes, this one’s pretty scary too. It happens when legitimate users cannot access information systems, devices, and other network resources because hackers have shut them down and seized control. There’s also a Distributed Denial of Service (DDOS) Attack, which happens when multiple computer systems flood their target with enough traffic from a “botnet” (a group of malware-infected private computers across the internet) to crash the server. If you’ve ever been asked to prove you’re not a robot when entering a website, this is the reason why.

credit: giphy.com

These attacks are rudimentary, but they can cost organizations time and money while their people are unable to access resources for anywhere from days to weeks. The record for the number of DDOS attacks launched per year was broken in 2020 with 10 million, a 20% increase from 2019.

Ransomware is probably the most intimidating form of DOS attack, as the Colonial Pipeline found out earlier this year. The sad thing is, that attack happened because of one compromised password.

Can it really be that hard to keep your passwords secure? The truth is there are at least 7 types of password attacks, and it takes a strong, dynamic password management plan to guard against them.

The more well-known attacks include:

  • Brute Force: Much like it sounds, numerous guesses are made to crack the password and gain access. A simple but usually automated form of attack.
  • Credential Stuffing: Another type of brute-force attack involving trial-and-error using stolen credentials.
  • Dictionary: A variation on the brute-force attack that involves commonly used words and phrases and oft-used passwords.
  • Man-in-the-Middle: An attack involving the user, the attacker, and a third party. Cyber criminals imitate a legitimate third party, usually via phishing emails that try to convince the third party to click on a link leading to an apparently legitimate website, thus allowing the attacker to collect user log-ins.
  • Keylogger: Spyware that records the user’s keystrokes.
  • Password Spraying: Yet another form of brute-force attack where a large number of common passwords are used on a small number of accounts, even just one.
  • Phishing: A versatile attack that can be as simple as one email or as complicated as a multi-step attack involving voice calls.

So how do you protect your company’s passwords? The only choice is to create and carry out a password management plan that is up to date with best practices. This includes:

  • Creating lengthy, complicated passwords for every account
  • Using multi-factor authentication everywhere you can (this creates an additional barrier to keep out hackers)
  • Utilizing a password manager to safely manage and store all passwords

Managing your passwords, limiting access to privileged accounts, and adding additional layers of security is something a solid tech partner can do to help back up your plan. Having employees and other company players learn about password security is also a crucial step.

Next we’ll be examining what happens when your company’s website is attacked, and what you can do about it. Stay tuned!

0
  • Tags Colonial Pipeline attack, Denial of Service, Distributed Denial of Service, DOS attack, Keylogger, Man-in-the-middle attack, Password attacks, Phishing

Recent Posts

  • Never use your browser’s password manager
  • Businesses are spending more on IT this year
  • Is your team still working at 10 at night?
  • You need this feature if your browser looks like this
  • Russian cyber-attack threat: How to protect your business
Loading

Archives

  • April 2022
  • March 2022
  • February 2022
  • November 2021
  • October 2021
  • May 2021
  • April 2021

Categories

  • #FTSInsights
  • Communications
  • Cybersecurity
  • Holidays

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

At Flint Tech Solutions, we use technology as the integrator to solve business problems.

Our dedicated team delivers value and efficiency while maintaining the highest level of customer service and support.

Facebook Twitter Instagram Linkedin

Quick Links

Home
About Us
Services
Testimonial
Pricing
Resources
Contact Us
Remote Support

Contact Us

Get in touch via mail, phone. We are waiting for your call or message.

Loading
  • 724-307-8310
  • info@flinttech.com
© Copyright Flint Tech 2021. All rights reserved.