ILMA Compoundings April 2017 - 32

widely in the last few years. This virus encrypts your data,
and the only way to get the data back is to either completely
wipe out the machine or pay a ransom fee in bitcoins.
Employee abuse of internet service privileges: Giving
employees open access to the internet has two potential
problems. The first is that employees may access websites
that contain viruses and malware which can infect your
internal network. The other issue is the employee can be
wasting tremendous amounts of time surfing the web
instead of doing his or her job. The abuse of internet service
privileges is an extremely common problem that can have
devastating effects on your bottom line. However, simple
preventive measures can be taken to limit the use of the web
to specific sites that are work-related and safe.

"Insiders have certain privileges that
make unauthorized access to information
far easier for them than for an outsider."

Unauthorized access by outsiders: Unauthorized access
by outsiders is hacking from an external source. It is just like
unauthorized access by insiders, except the perpetrator is
working from outside the company's computers or systems.
There are three types of cybercrimes:
Denial of Service: Denial of service (DoS) attacks occur
to shut a business down or limit access to its data. This can
occur when a cyberattack floods a company's machines or
systems with requests, overloading the systems and preventing other requests from being fulfilled, or it could be that
a virus shuts down the network so that the business can't
access it.
Theft of proprietary information: Stealing proprietary
information has become very prevalent. This can be cases
of corporate espionage, where another company is hacking
into your system or having a current or former employee go
into your system and steal information, or it can be done by
individuals stealing proprietary information for their own
financial gain.
Sabotage of data and/or networks: Data sabotage
occurs when an attacker manipulates a company's data
simply for the satisfaction of destroying it. This is like graffiti or destruction of property; it serves no purpose other
than destruction.

THE TWO TRANCHES OF RISK

Unauthorized access by insiders: Perhaps more commonly known as hacking, "unauthorized access" is a term
used to describe incidents in which a company's data has
been compromised. Insiders, or people from within a company, pose a greater threat than outsiders because of their
knowledge of the business. On many occasions, insiders are
able to access information they should not or would not
have access to because the company has failed to implement
the proper safeguards to protect itself and its information.
Insiders have certain privileges that make unauthorized
access to information far easier for them than for an outsider.

32

APRIL 2017

| COMPOUNDINGS | ILMA.ORG

Most of the risk of cyberattacks businesses face can be
attributed to two broad tranches:
Human Behavior: People are not perfect. Companies
open themselves up to attacks when employees send or
respond to emails from the wrong person, lose devices, open
programs or messages on their devices that contain malware
(such as viruses, worms or Trojan horses) and surf the web
in a negligent manner.
Infrastructure: A weak infrastructure can increase a business' risk of getting hacked or being negatively affected by
malware. Hackers look for easy access to systems, so if you
don't have firewalls around your network or your server tied
down with restricted access you are an easy mark. It's like
leaving your front door open.

PROTECTING YOUR COMPANY
The access points businesses should be protecting include:
individual PCs, phones, tablets, networks and servers.
There are several strategies and techniques every business
should employ in order to protect these access points from
an attack:
Run spyware and keep it up to date: Spyware is usually
used to collect information about how an individual or
company uses its computers. Spyware has a negative connotation associated with it, because it is usually used to steal


http://www.ILMA.ORG

ILMA Compoundings April 2017

Table of Contents for the Digital Edition of ILMA Compoundings April 2017

ILMA Compoundings April 2017 - Cover1
ILMA Compoundings April 2017 - Cover2
ILMA Compoundings April 2017 - 1
ILMA Compoundings April 2017 - 2
ILMA Compoundings April 2017 - 3
ILMA Compoundings April 2017 - 4
ILMA Compoundings April 2017 - 5
ILMA Compoundings April 2017 - 6
ILMA Compoundings April 2017 - 7
ILMA Compoundings April 2017 - 8
ILMA Compoundings April 2017 - 9
ILMA Compoundings April 2017 - 10
ILMA Compoundings April 2017 - 11
ILMA Compoundings April 2017 - 12
ILMA Compoundings April 2017 - 13
ILMA Compoundings April 2017 - 14
ILMA Compoundings April 2017 - 15
ILMA Compoundings April 2017 - 16
ILMA Compoundings April 2017 - 17
ILMA Compoundings April 2017 - 18
ILMA Compoundings April 2017 - 19
ILMA Compoundings April 2017 - 20
ILMA Compoundings April 2017 - 21
ILMA Compoundings April 2017 - 22
ILMA Compoundings April 2017 - 23
ILMA Compoundings April 2017 - 24
ILMA Compoundings April 2017 - 25
ILMA Compoundings April 2017 - 26
ILMA Compoundings April 2017 - 27
ILMA Compoundings April 2017 - 28
ILMA Compoundings April 2017 - 29
ILMA Compoundings April 2017 - 30
ILMA Compoundings April 2017 - 31
ILMA Compoundings April 2017 - 32
ILMA Compoundings April 2017 - 33
ILMA Compoundings April 2017 - 34
ILMA Compoundings April 2017 - 35
ILMA Compoundings April 2017 - 36
ILMA Compoundings April 2017 - 37
ILMA Compoundings April 2017 - 38
ILMA Compoundings April 2017 - 39
ILMA Compoundings April 2017 - 40
ILMA Compoundings April 2017 - 41
ILMA Compoundings April 2017 - 42
ILMA Compoundings April 2017 - 43
ILMA Compoundings April 2017 - 44
ILMA Compoundings April 2017 - 45
ILMA Compoundings April 2017 - 46
ILMA Compoundings April 2017 - 47
ILMA Compoundings April 2017 - 48
ILMA Compoundings April 2017 - 49
ILMA Compoundings April 2017 - 50
ILMA Compoundings April 2017 - 51
ILMA Compoundings April 2017 - 52
ILMA Compoundings April 2017 - 53
ILMA Compoundings April 2017 - 54
ILMA Compoundings April 2017 - 55
ILMA Compoundings April 2017 - 56
ILMA Compoundings April 2017 - Cover3
ILMA Compoundings April 2017 - Cover4
https://www.nxtbook.com/ygsreprints/ILMA/G127535ILMA_vol71_no7
https://www.nxtbook.com/ygsreprints/ILMA/G126213ILMA_vol71_no6
https://www.nxtbook.com/ygsreprints/ILMA/G125546_ILMA_vol71_no5
https://www.nxtbook.com/ygsreprints/ILMA/G124996_ILMA_vol71_no4
https://www.nxtbook.com/ygsreprints/ILMA/G123886_ILMA_vol71_no3
https://www.nxtbook.com/ygsreprints/ILMA/G123315_ILMA_vol71_no2
https://www.nxtbook.com/ygsreprints/ILMA/G122980_ILMA_vol71_no1
https://www.nxtbook.com/ygsreprints/ILMA/G121540_ILMA_vol70_no11
https://www.nxtbook.com/ygsreprints/ILMA/G120882_ILMA_vol70_no10
https://www.nxtbook.com/ygsreprints/ILMA/G120035_ILMA_vol70_no9
https://www.nxtbook.com/ygsreprints/ILMA/G121XXX_ILMA_vol70_no8
https://www.nxtbook.com/ygsreprints/ILMA/G120XXX_ILMA_vol70_no7
https://www.nxtbook.com/ygsreprints/ILMA/G119XXX_ILMA_vol70_no6
https://www.nxtbook.com/ygsreprints/ILMA/G118112_ILMA_vol70_no5
https://www.nxtbook.com/ygsreprints/ILMA/G117382_ILMA_vol70_no4
https://www.nxtbook.com/ygsreprints/ILMA/G116888_ILMA_vol70_no3
https://www.nxtbook.com/ygsreprints/ILMA/G115555_ILMA_vol70_no2
https://www.nxtbook.com/ygsreprints/ILMA/G114774_ILMA_vol70_no1
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no12
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no11
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no10
https://www.nxtbook.com/ygsreprints/ILMA/g109884_ILMA_vol69_no9
https://www.nxtbook.com/ygsreprints/ILMA/g109284_ILMA_vol69_no8
https://www.nxtbook.com/ygsreprints/ILMA/g108494_ILMA_vol69_no7
https://www.nxtbook.com/ygsreprints/ILMA/g107507_ILMA_vol69_no6
https://www.nxtbook.com/ygsreprints/ILMA/g106483_ILMA_vol69_no5
https://www.nxtbook.com/ygsreprints/ILMA/g105803_ILMA_vol69_no4
https://www.nxtbook.com/ygsreprints/ILMA/g104743_ILMA_vol69_no3
https://www.nxtbook.com/ygsreprints/ILMA/g103647_ILMA_vol69_no2
https://www.nxtbook.com/ygsreprints/ILMA/g102869_ILMA_vol69_no1
https://www.nxtbook.com/ygsreprints/ILMA/g101930_ILMA_vol68_no12
https://www.nxtbook.com/ygsreprints/ILMA/g100836_ILMA_vol68_no11
https://www.nxtbook.com/ygsreprints/ILMA/g99200_ILMA_vol68_no10
https://www.nxtbook.com/ygsreprints/ILMA/g98468_ILMA_vol68_no9
https://www.nxtbook.com/ygsreprints/ILMA/g97711_ILMA_vol68_no8
https://www.nxtbook.com/ygsreprints/ILMA/G96767ILMA_vol68_no7
https://www.nxtbook.com/ygsreprints/ILMA/G95397ILMA_vol65_no6
https://www.nxtbook.com/ygsreprints/ILMA/G94323ILMA_vol68_no5
https://www.nxtbook.com/ygsreprints/ILMA/G93127_ILMA_vol69_no4
https://www.nxtbook.com/ygsreprints/ILMA/G91785_ILMA_vol68_no3
https://www.nxtbook.com/ygsreprints/ILMA/G90956_ILMA_vol68_no2
https://www.nxtbook.com/ygsreprints/ILMA/G89146_ILMA_vol68_no1
https://www.nxtbook.com/ygsreprints/ILMA/G87981_ILMA_vol67_no12
https://www.nxtbook.com/ygsreprints/ILMA/G85409_ILMA_vol67_no11
https://www.nxtbook.com/ygsreprints/ILMA/G83595_ILMA_vol67_no10
https://www.nxtbook.com/ygsreprints/ILMA/G81672_ILMA_vol67_no9
https://www.nxtbook.com/ygsreprints/ILMA/G80238_ILMA_vol7_no8
https://www.nxtbook.com/ygsreprints/ILMA/G79388_ILMA_vol7_no7
https://www.nxtbook.com/ygsreprints/ILMA/G78361_ILMA_vol7_no6
https://www.nxtbook.com/ygsreprints/ILMA/G77448_ILMA_vol7_no5
https://www.nxtbook.com/ygsreprints/ILMA/G75899_ILMA_vol67_no4
https://www.nxtbook.com/ygsreprints/ILMA/G75036_ILMA_vol67_no3
https://www.nxtbook.com/ygsreprints/ILMA/G72720_ILMA_vol67_no2
https://www.nxtbook.com/ygsreprints/ILMA/G72220_ILMA_vol67_no1
https://www.nxtbook.com/ygsreprints/ILMA/G70970_ILMA_vol66_no12
https://www.nxtbook.com/ygsreprints/ILMA/G69813_ILMA_vol66_no11
https://www.nxtbook.com/ygsreprints/ILMA/G67522_ILMA_vol66_no10
https://www.nxtbook.com/ygsreprints/ILMA/G66343_ILMA_vol66_no9
https://www.nxtbook.com/ygsreprints/ILMA/G64859_ILMA_vol66_no8
https://www.nxtbookmedia.com