Data in transit or storage is vulnerable to outside interference. We call such interference, cyber attacks, which can take on many forms. Two major areas of concern are hacking and Distributed Denial-of-service (DDoS) attacks.
“Hacking” is the deliberate exploitation of a computer system or network to gain access to data. Hackers breach computers and networks for a variety of reasons, but a few of their most common goals are:
- Gaining access to financial accounts in order to steal money
- Seeking confidential information, such as trade secrets and intellectual property
- Causing general mayhem
Hacking is difficult to eradicate because the methods of attack are always evolving. While off-the-shelf protection software can help, it’s not a guaranteed defense against a hacking attempt.
DDoS attacks are gaining much publicity throughout the world; that of willful, physical attacks on data infrastructure as well as against hardware connected to systems for the purpose of shutting down large segments of industry and commerce.
We are already experiencing increasing intrusions from DDoS attacks blocking the computer systems of targeted businesses by flooding them with massive amounts of communication requests. DDoS describes a computer system so congested that it is rendered useless.
In addition to hacking and DDoS attacks, malware is a major concern for anyone with a computer.
Malware is an expression for malicious software programming that is introduced into a computer system for destructive reasons. Cyber attacks sometimes start in a low-key manner using malware; a reasonable instruction appears on your computer screen, and clicking on the “recommended” response opens the door for the hacker to enter your system.
The malware may not itself affect the system but may pave the way for a hacker by manipulating the operator’s software so the computer welcomes a second attack later. This type of malware vehicle is called a Trojan horse, making use of a seemingly innocent means of entry.
A computer virus is a type of malware. Like a biological virus, it spreads, but to do so requires operator action, such as forwarding a tainted email to another computer in the system.
Many viruses are sent along as a result of the operator’s wish to share a website with contacts, copying and pasting the web address into the email to save time. This is called “phishing.” The hacker plants a remote access tool – known as a RAT – that can obtain an array of information including your password.
Among viruses, more pervasive, however, are the actions of a “worm.” Its name and means are descriptive as it burrows its way through a computer system, rendering not only software but hardware unusable, usually resulting in a total loss of data.
An ominous trend has developed in recent years in the world of cyberattacks. Many large corporations, and even governments, have been stricken without any indications of imminent action. The severity of the attacks has escalated to a point where we may have to refer to some of these as cyberwar.
Additionally, there are indications that national governments have initiated actions for political or strategic advantage. What governments can do now, radicals can emulate in the very near future. Activist groups such as Anonymous have proven that they can do this already.
Attacks are inevitable
Most companies are not equipped to tackle hackers. That is particularly true in the aftermath of a cyber event. The magnitude of the damage could be extensive, complicated and slow to investigate.
All businesses should have a disaster recovery plan for cyberattacks so that when telltale signs come across your computer screens indicating ominous intent, you have a system that offers a response. Much complacency exists among the public and indicates we may want to reexamine our posture.
Businesses are both a cybercriminal’s target and a conduit to attack their clients. Having antivirus software and firewalls are good preventative measures against cyber attacks. But since cyberattacks can’t be completely prevented, backing up data is vital and cyber risk insurance is becoming a must-have for businesses of all sizes to help them recover from damage to data and systems caused by these different computer attacks.
Want more information like this delivered straight to your inbox? Click the “Follow” button on the bottom right and enter your email address.
© 2020 Updates (originally published in 2015) The Hartford Steam Boiler Inspection and Insurance Company. All rights reserved. This article is for informational purposes only and is not intended to convey or constitute legal advice. HSB makes no warranties or representations as to the accuracy or completeness of the content herein. Under no circumstances shall HSB or any party involved in creating or delivering this article be liable to you for any loss or damage that results from the use of the information contained herein. Except as otherwise expressly permitted by HSB in writing, no portion of this article may be reproduced, copied, or distributed in any way. This article does not modify or invalidate any of the provisions, exclusions, terms or conditions of the applicable policy and endorsements. For specific terms and conditions, please refer to the applicable endorsement form.