{"id":21623,"date":"2020-03-16T06:56:41","date_gmt":"2020-03-16T06:56:41","guid":{"rendered":"https:\/\/itt.com.au\/?p=21623"},"modified":"2020-03-16T06:56:41","modified_gmt":"2020-03-16T06:56:41","slug":"top-10-cyber-security-risks","status":"publish","type":"post","link":"https:\/\/itt.com.au\/top-10-cyber-security-risks\/","title":{"rendered":"Top 10 cyber security risks and how to mitigate them"},"content":{"rendered":"\n

Cyber security attacks are on the rise. In 2016-2017, 47,000 attacks were recorded in Australia according to the Australian Cyber Security Centre (ACSC).<\/p>\n\n\n\n

Cyber security risks or threats are malicious acts which set out to steal or damage an organisation\u2019s data or disrupt operations.<\/p>\n\n\n\n

So what are the top 10 cyber security risks to your business?<\/h4>\n\n\n\n
  1. Malware. Software that is embedded on a device or network to corrupt data or hijack a system. Malware attacks can also occur on mobile apps.<\/li><\/ol>\n\n\n\n
    1. Phishing. Emails which trick recipients into sharing confidential information or downloading malware.<\/li><\/ol>\n\n\n\n
      1. Spear Phishing. Targeted form of phishing where the attacker pretends to know the recipient or impersonates someone they know.<\/li><\/ol>\n\n\n\n
        1. \u201cMan in the Middle\u201d (MitM) attack. Where an attacker eavesdrops on, intercepts and modifies digital messages.<\/li><\/ol>\n\n\n\n
          1. Trojans. A type of malware that appears to be legitimate software but can take over a system.<\/li><\/ol>\n\n\n\n
            1. Ransomware. A form of malware that encrypts the victim’s files. The attacker demands a ransom to restore access.<\/li><\/ol>\n\n\n\n
              1. Denial of Service attack or Distributed Denial of Service Attack (DDoS<\/a>). Where an attacker floods a system using multiple devices, to crash or disrupt service.<\/li><\/ol>\n\n\n\n
                1. Attacks on Internet of Things (IoT) Devices. IoT devices refers to any device – simple or comprehensive – which connects to the internet.<\/li><\/ol>\n\n\n\n
                  1. Data Breaches. A data breach is a theft of data.<\/li><\/ol>\n\n\n\n
                    1. Employee caused data breaches. These may be malicious internal breaches or accidental breaches caused by employees.<\/li><\/ol>\n\n\n\n

                      How can organisations mitigate these cyber security risks?<\/p>\n\n\n\n