Download Simplifying It Security for Dummies PDF

TitleSimplifying It Security for Dummies
File Size3.7 MB
Total Pages76
Table of Contents
                            Introduction
	About This Book
	Foolish Assumptions
	How This Book Is Organised
	Icons Used in This Book
	Where to Go from Here
Chapter 1: Why All Businesses Need to Protect Sensitive Information
	Businesses Are Under Attack
	Smaller Businesses – Bigger Pressures
	False Sense of Security?
Chapter 2: Working Out What Your Business Needs
	Some Security Needs Apply to All Sizes of Business
	Different Levels of Understanding and Resources
	Understanding Different Security Requirements
Chapter 3: Discovering the Truth About Security Threats
	IT’s All Got More Complex
	Today’s Threats Are Increasingly Dangerous
	Know the Enemy and Know Their Methods
	Understanding Other Security Risks
Chapter 4: Planning for Better Information Security
	Risky Business?
	Educating Employees in the Art of Security
	Up in the Clouds
Chapter 5: Choosing Security Software to Suit Your Business
	Selecting the Right Supplier
	High Flyer or Lifestyle Business: Identifying Your Security Needs
	From Home-User Security to Business-Level Protection
Chapter 6: Ten Questions to Help Identify How to Protect Your Business
                        
Document Text Contents
Page 2

http://www.kaspersky.com/business

Page 38

32

Today’s Threats Are Increasingly
Dangerous
Virtually everyone has some level of understanding of
computer viruses. Most people have been either subject
to a nasty virus infection (we mean on your PC – we’re
not getting personal) or know someone who’s suffered
such an attack in the past. However, much of this
experience – and the anecdotes that friends and family
recall – may date from the era of cyber vandalism,
when malware development was for fun. Today,
cybercriminals use malware for financial gain.

The low-risk years are over
Years ago, cyber vandals were often students and
school children looking to show off their computing
and hacking skills. They created and distributed
viruses that caused a level of disruption on infected
machines. Perhaps the virus would delete a few files or
make the victim’s computer ‘hang up’. Even though it
was largely a matter of mischief-making on the part of
the virus developers, their programs could cause some
inconvenience.

However, these viruses rarely caused significant
ongoing issues for businesses and they didn’t try to
steal funds from individuals’ or businesses’ bank
accounts. In addition, basic antivirus software was
often enough to repel most of these attacks.

Page 39

33

Simple vandalism makes way
for serious cybercrime
In recent years, young computer geeks have turned
their attention to online games that give them an
opportunity to show off their prowess. At the same
time – and more importantly – with the relentless rise
in the use of Internet-based business processes and
online financial transactions, we’re all a lot more
dependent on the Internet and e-commerce. This has
attracted the attention of criminals. The age of relatively
innocent cyber vandalism has passed and a much more
menacing presence lurks on the Internet.

Cybercriminals have been quick to recognise
the opportunities to develop malware and
Internet-based scams that do much more
harm than old-fashioned viruses. Instead,
these new attacks are focused on stealing
information, money and anything else of value
to the cybercriminal. Make no mistake, these
are no mere amateurs. Cybercriminals with
considerable technical skills are constantly
developing new methods of attacking
businesses. In most cases, they’re motivated
by financial gain – either directly stealing
money from a business’s bank account,
stealing sensitive business data to sell on the
black market, or extorting payments from the
company through other means.

In addition, by ‘harvesting’ personal information from a
company’s laptops, servers and mobile devices,
cybercriminals can perform identity theft scams and
steal money from individuals associated with the
business.

Page 75

http://www.kaspersky.com/protectmybusiness

Page 76

http://www.dummies.com

Similer Documents