What is Cybersecurity?

Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks. It aims to reduce the risk of cyber attacks and protect against the unauthorized exploitation of systems, networks and technologies.

Types of Cybersecurity Threats

dreamstime_s_208376679.jpg
dreamstime_s_113836597.jpg

Malware

Malware, an abbreviation of "malicious software," is a type of computer program whose purpose is to infect a user's computer. Malware is usually installed by accident, often by downloading software such as browser toolbars, download assistants, etc., or purposely by just clicking through software installs and not reading what else will be downloaded  downloading software such as browser toolbars, download assistants, etc.

We deploy software that will detect and identify any Malware risks that are on your computer. After we are notified, we, more often than not, are able to resolve the issue without interrupting any work being done.

Data Breaches

A data breach is an incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner. Stolen data may involve sensitive or confidential information such as credit card numbers, customer data, trade secrets, or matters of national security.

We are able to assist you with this issue by being notified with 24 hours of discovery on the dark web. For more information on this please visit our DarkWeb Monitoring page HERE.

Man in the Middle Attacks

Man-in-the-middle(MITM) attacks work by the process of controlling the lines of communication between people, computers, or servers. There is not just one way to conduct a MITM attack which makes it difficult to identify and defend against. Man-in-the-middle attacks don't always require an infected computer, meaning there are multiple avenues of attack. These attacks can be accomplished by means of Wi-FI and HTTPS spoofing, SSL Hijacking, DNS Spoofing, and Email Hijacking.

Contact us today to see how we can help with MITM attacks and tips on how to combat this issue.

Phising

Phishing is the act of attempting to manipulate the recipient of a malicious email into opening and engaging with it. A sender of a malicious email intends to deceive a victim by making the email seem important and from a reputable source.

These phishing emails may include harmful attachments, like PDF or Word documents, which once opened can cause harm to the user’s computer by installing forms of malware, ransomware, or other unsavory software. Phishing emails can also contain malicious links in the body that can lead a user to a fraudulent site. These sites are used to collect confidential information such as usernames and passwords, or to install malware onto a device. Once the victim’s information has been obtained, scammers will monetize the data by selling it to the highest bidder on Dark Web sites.

ERH has the ability to monitor the DarkWeb for any exposed credentials and we can inform you within 24-hours of discovery. We also offer Simulated Phishing training. Learn more about our DarkWeb scanning HERE and CONTACT US to learn more about our Simulated Phishing training.

Ransomware

Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment. 

Users are shown instructions for how to pay a fee to get the decryption key. The costs can range from a few hundred dollars to thousands, payable to cybercriminals in Bitcoin.