top of page

Cyber Security

When it comes to the security for your organisation now it is more important than ever to get the right configuration in place to protect you. Cyber security is often described as being setup in layers.

This means that you have as many tools in place as feasible to try and catch an attack before it causes any damage.

What types of attack are there?


Phishing is the practice of sending fraudulent communications that appear to come from a reputable source, usually through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing is an increasingly common cyberthreat.


Malware is a term used to describe malicious software, including spyware, ransomware, viruses, and worms. Malware breaches a network through a vulnerability, typically when a user clicks a dangerous link or email attachment that then installs risky software. Once inside the system, malware can do the following:

  • Blocks access to key components of the network (ransomware)

  • Installs malware or additional harmful software

  • Covertly obtains information by transmitting data from the hard drive (spyware)

  • Disrupts certain components and renders the system inoperable


Man in the Middle

Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when attackers insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can filter and steal data.

Two common points of entry for MitM attacks:

1. On unsecure public Wi-Fi, attackers can insert themselves between a visitor’s device and the network. Without knowing, the visitor passes all information through the attacker.

2. Once malware has breached a device, an attacker can install software to process all of the victim’s information.

Denial of Service (DOS)

Zero Day Exploit

A zero-day exploit hits after a network vulnerability is announced but before a patch or solution is implemented. Attackers target the disclosed vulnerability during this window of time. Zero-day vulnerability threat detectionrequires constant awareness.

bottom of page