{"id":21623,"date":"2020-03-16T06:56:41","date_gmt":"2020-03-16T06:56:41","guid":{"rendered":"https:\/\/itt.com.au\/?p=21623"},"modified":"2020-03-16T06:56:41","modified_gmt":"2020-03-16T06:56:41","slug":"top-10-cyber-security-risks","status":"publish","type":"post","link":"https:\/\/itt.com.au\/top-10-cyber-security-risks\/","title":{"rendered":"Top 10 cyber security risks and how to mitigate them"},"content":{"rendered":"\n
Cyber security attacks are on the rise. In 2016-2017, 47,000 attacks were recorded in Australia according to the Australian Cyber Security Centre (ACSC).<\/p>\n\n\n\n
Cyber security risks or threats are malicious acts which set out to steal or damage an organisation\u2019s data or disrupt operations.<\/p>\n\n\n\n
So what are the top 10 cyber security risks to your business?<\/h4>\n\n\n\n
Malware. Software that is embedded on a device or network to corrupt data or hijack a system. Malware attacks can also occur on mobile apps.<\/li><\/ol>\n\n\n\n
Phishing. Emails which trick recipients into sharing confidential information or downloading malware.<\/li><\/ol>\n\n\n\n
Spear Phishing. Targeted form of phishing where the attacker pretends to know the recipient or impersonates someone they know.<\/li><\/ol>\n\n\n\n
\u201cMan in the Middle\u201d (MitM) attack. Where an attacker eavesdrops on, intercepts and modifies digital messages.<\/li><\/ol>\n\n\n\n
Trojans. A type of malware that appears to be legitimate software but can take over a system.<\/li><\/ol>\n\n\n\n
Ransomware. A form of malware that encrypts the victim’s files. The attacker demands a ransom to restore access.<\/li><\/ol>\n\n\n\n