& DISASTER RECOVERY
Cloud Backups and Disaster Recovery
Though backups and disaster recovery are two different things, in many instances they go hand in hand. Look at the following scenario:
Types of Cybersecurity Threats
Malware, an abbreviation of "malicious software," is a type of computer program whose purpose is to infect a user's computer. Malware is usually installed by accident, often by downloading software such as browser toolbars, download assistants, etc., or purposely by just clicking through software installs and not reading what else will be downloaded downloading software such as browser toolbars, download assistants, etc.
We deploy software that will detect and identify any Malware risks that are on your computer. After we are notified, we, more often than not, are able to resolve the issue without interrupting any work being done.
A data breach is an incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner. Stolen data may involve sensitive or confidential information such as credit card numbers, customer data, trade secrets, or matters of national security.
We are able to assist you with this issue by being notified with 24 hours of discovery on the dark web. For more information on this please visit our DarkWeb Monitoring page HERE.
Man in the Middle Attacks
Man-in-the-middle(MITM) attacks work by the process of controlling the lines of communication between people, computers, or servers. There is not just one way to conduct a MITM attack which makes it difficult to identify and defend against. Man-in-the-middle attacks don't always require an infected computer, meaning there are multiple avenues of attack. These attacks can be accomplished by means of Wi-FI and HTTPS spoofing, SSL Hijacking, DNS Spoofing, and Email Hijacking.
Contact us today to see how we can help with MITM attacks and tips on how to combat this issue.
Phishing is the act of attempting to manipulate the recipient of a malicious email into opening and engaging with it. A sender of a malicious email intends to deceive a victim by making the email seem important and from a reputable source.
These phishing emails may include harmful attachments, like PDF or Word documents, which once opened can cause harm to the user’s computer by installing forms of malware, ransomware, or other unsavory software. Phishing emails can also contain malicious links in the body that can lead a user to a fraudulent site. These sites are used to collect confidential information such as usernames and passwords, or to install malware onto a device. Once the victim’s information has been obtained, scammers will monetize the data by selling it to the highest bidder on Dark Web sites.
ERH has the ability to monitor the DarkWeb for any exposed credentials and we can inform you within 24-hours of discovery. We also offer Simulated Phishing training. Learn more about our DarkWeb scanning HERE and CONTACT US to learn more about our Simulated Phishing training.
Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment.
Users are shown instructions for how to pay a fee to get the decryption key. The costs can range from a few hundred dollars to thousands, payable to cybercriminals in Bitcoin.