Could you identify a hack to your system?

Could you identify a hack to your system?
A hack refers to any breach of your IT system where by your data is compromised.
The following are examples of hacks you or business may encounter
adapted from the following article Click here
Keylogger
A malware hack used to record the strokes of your keyboard potentially giving away email IDs and passwords
Denial of Service (DoS)
A technique where the hacker can flood your site with requests, consequently overloading and shutting down your server or site
Waterhole Attacks
A targeted attack whereby a site frequently used by the individual or organisation is altered and infected with Malware
Fake WAP
Software can be used to fake a Wireless Access Point so that when an individual logs on their data becomes compromised
Eavesdropping
This attack does not harm the system but the hacker can watch and wait for the information they require
Phishing
This type of attack is also targeted; the hacker can identify the sites most frequented by the individual or group and sends similar links to spoof sites to try and deceive the target into clicking on the link
Virus/trojan
Malicious software transmitted by the hacker to gain access to data
Clickjacking
The User Interface is hijacked and hidden so the user is duped into using an interface created by the hacker to glean the users data
Cookie theft
Once your cookies are accessed the hacker can gain access to logins and passwords on your browser
Bait and Switch
The hacker runs a malicious file believed to be authentic by the user. This allows the hacker the full run of your machine
Identifying a hack
Victims of cyber-crime rarely realise they have been hacked until it is too late. The following are signs to watch out for
adapted from the following article Click here
- Unwanted browser toolbars
- Redirected internet searches
- Frequent and random pop-ups
- Contacts receive suspicious emails from your account
- Change of password
- Unexpected software installs
- Ghost mouse – your mouse moves by itself seeming to make intentional selections
- Anti-virus software or task manager has been disabled and fails to restart
- Your bank account is missing money
- You get calls from stores claiming non-payment of goods
How to respond to a hack
If you think you have been hacked it is important not to panic, the wrong move can potentially exacerbate the situation and make it more difficult to investigate. If you are using a company device it is vital you report the suspected attack immediately.
If you are unable to get immediate help it is advised to disconnect the device from the internet and switch to hibernation mode, it is important that you do not switch off the device
Unless you are tech savvy and a confident user it is recommended that your device is assessed by a local IT professional.
It is advisable to have a Standard Operating Procedure in place so that your business is prepared to handle any cyber-security threats. It is also important that employees are aware of potential threats, their consequences and how to avoid them.
The following link contains some good tips on how best to avoid an online security breach
Should you report a cyber-crime
Many people don’t report incidents of cyber-crime, however, it is important to do so.
When incidents go unreported it becomes difficult for cases to be built against the responsible criminals. The Garda Bureau of Fraud Investigation is the relevant body to contact
Click here for contact details
From May 2018 it will be compulsory to report incidents of data breach under the General Data Protection Regulation Act. These cases should be reported to the Irish Data Protection Commissioner
Click here for contact details