i3 - July/August 2017 - 44

Business

By Scott Steinberg

Ransomware

This software is designed to hold
a computer system or network
(and the data contained within it)
hostage. Often taking the form
of a virus or Trojan, it's effectively
crafted - when accidentally
installed, clicked on, or activated
by an unsuspecting party - to hijack
sensitive information or files, until
a payment is made to the hacker
behind the attack. According to
online safety provider Symantec,
the average cost of ransoms is
$300 per computer - costs that
can quickly add up unless you
learn to play it safe up-front.

Hacking

This is an intrusion or unauthorized
entry into a computer, system or
network by another party. Others
may choose to hack your company's
infrastructure for the purpose of
obtaining sensitive information, disrupting operations, compromising
secrets or sources of competitive
advantage, engaging in acts of malice and a myriad of other reasons.
Among today's most common
cybercrimes, hacking is a felony in
the U.S. and carries stiff penalties.
Unfortunately, its consequences can
also be highly costly and damaging
for businesses, especially in terms of
brand reputation, should incidents
become public.

FO RWA R D ST R AT EG I E S

How to Spot and
Combat Cyber Threats

 C  

yberattacks and crimes such as the rash of recent WannaCry
ransomware outbreaks are skyrocketing. In fact, they have
increased by nearly 400 percent since 2015, according to
application security testing firm Checkmarx and may cost enterprises
more than $2 trillion annually within the next two years. Anticipated
to become a bigger concern as more organizations embrace virtualization and big data, it's vital to watch for signs of trouble and be proactive
about preparing your enterprise to defeat them. Here is a guide to
several frequently encountered types of cybercrimes that organizations
should be equipped to spot and fight back against.

44

JULY/AUGUST 2017

Instead of simply trying to invade
systems and monitor for activity,
cyber criminals may alternately
enter them with more nefarious
goals, including attempting to
disrupt operations or permanently
disable them. A few tricks troublemakers may employ range from
trying to cripple servers by bombarding them with massive bursts
of information or activity, exploiting
glitches or vulnerabilities in software or implanting harmful programs designed to harvest
information or cripple your organization's online activities. Be forewarned: Attacks on major brands
are becoming more commonplace
and should be anticipated with
both low and high-tech safeguards
(as well as multiple contingencies,
backups and fallbacks) put in place
at every level.
I T I S I N N O VAT I O N

Peter Dazeley/Getty Images

Attacks on
Computer Systems



i3 - July/August 2017

Table of Contents for the Digital Edition of i3 - July/August 2017

Contents
i3 - July/August 2017 - Cover1
i3 - July/August 2017 - Cover2
i3 - July/August 2017 - Contents
i3 - July/August 2017 - 2
i3 - July/August 2017 - 3
i3 - July/August 2017 - 4
i3 - July/August 2017 - 5
i3 - July/August 2017 - 6
i3 - July/August 2017 - 7
i3 - July/August 2017 - 8
i3 - July/August 2017 - 9
i3 - July/August 2017 - 10
i3 - July/August 2017 - 11
i3 - July/August 2017 - 12
i3 - July/August 2017 - 13
i3 - July/August 2017 - 14
i3 - July/August 2017 - 15
i3 - July/August 2017 - 16
i3 - July/August 2017 - 17
i3 - July/August 2017 - 18
i3 - July/August 2017 - 19
i3 - July/August 2017 - 20
i3 - July/August 2017 - 21
i3 - July/August 2017 - 22
i3 - July/August 2017 - 23
i3 - July/August 2017 - 24
i3 - July/August 2017 - 25
i3 - July/August 2017 - 26
i3 - July/August 2017 - 27
i3 - July/August 2017 - 28
i3 - July/August 2017 - 29
i3 - July/August 2017 - 30
i3 - July/August 2017 - 31
i3 - July/August 2017 - 32
i3 - July/August 2017 - 33
i3 - July/August 2017 - 34
i3 - July/August 2017 - 35
i3 - July/August 2017 - 36
i3 - July/August 2017 - 37
i3 - July/August 2017 - 38
i3 - July/August 2017 - 39
i3 - July/August 2017 - 40
i3 - July/August 2017 - 41
i3 - July/August 2017 - 42
i3 - July/August 2017 - 43
i3 - July/August 2017 - 44
i3 - July/August 2017 - 45
i3 - July/August 2017 - 46
i3 - July/August 2017 - 47
i3 - July/August 2017 - 48
i3 - July/August 2017 - 49
i3 - July/August 2017 - 50
i3 - July/August 2017 - 51
i3 - July/August 2017 - 52
i3 - July/August 2017 - Cover3
i3 - July/August 2017 - Cover4
https://www.nxtbook.com/nxtbooks/manifest/i3_20210304
https://www.nxtbook.com/nxtbooks/manifest/i3_20210102
https://www.nxtbook.com/nxtbooks/manifest/i3_20201112
https://www.nxtbook.com/nxtbooks/manifest/i3_20200910
https://www.nxtbook.com/nxtbooks/manifest/i3_20200708
https://www.nxtbook.com/nxtbooks/manifest/i3_20200506
https://www.nxtbook.com/nxtbooks/manifest/i3_20200304
https://www.nxtbook.com/nxtbooks/manifest/i3_20200102
https://www.nxtbook.com/nxtbooks/manifest/i3_20191112
https://www.nxtbook.com/nxtbooks/manifest/i3_20190910
https://www.nxtbook.com/nxtbooks/manifest/i3_20190708
https://www.nxtbook.com/nxtbooks/manifest/i3_20190506
https://www.nxtbook.com/nxtbooks/manifest/i3_20190304
https://www.nxtbook.com/nxtbooks/manifest/i3_20190102
https://www.nxtbook.com/nxtbooks/manifest/i3_20181112
https://www.nxtbook.com/nxtbooks/manifest/i3_20180910
https://www.nxtbook.com/nxtbooks/manifest/i3_20180708
https://www.nxtbook.com/nxtbooks/manifest/i3_20180506
https://www.nxtbook.com/nxtbooks/manifest/i3_20180304
https://www.nxtbook.com/nxtbooks/manifest/i3_20180102
https://www.nxtbook.com/nxtbooks/manifest/i3_20171112
https://www.nxtbook.com/nxtbooks/manifest/i3_20170910
https://www.nxtbook.com/nxtbooks/manifest/i3_20170708
https://www.nxtbook.com/nxtbooks/manifest/i3_20160102
https://www.nxtbook.com/nxtbooks/manifest/i3_20160304
https://www.nxtbook.com/nxtbooks/manifest/i3_20160506
https://www.nxtbook.com/nxtbooks/manifest/i3_20160708
https://www.nxtbook.com/nxtbooks/manifest/i3_20170506
https://www.nxtbook.com/nxtbooks/manifest/i3_20170304
https://www.nxtbook.com/nxtbooks/manifest/i3_20170102
https://www.nxtbook.com/nxtbooks/manifest/i3_20161112
https://www.nxtbook.com/nxtbooks/manifest/i3_20160910
https://www.nxtbookmedia.com