IT Solution - Cyber Security and How to Strengthen it
View this email in your browser

Cyber Security and How to Strengthen it

   What is Cyber Security?

As the number of mobile users increase, so do the opportunities for exploitation. In fact, hundreds to thousands of network outages, computer viruses, data compromised by hackers, and other incidents are affecting our lives. Cyber security is an attempt to protect your data, programs, computers, and networks from such exploitation. And, this has even become a critical issue in the society considering that the growing volume and sophistication of cyber attacks have been at a point where national security is threatened.

Cyber security is everyone’s responsibility, especially those directly affected such as governments, military, financial institutions, corporations, hospitals, and other businesses. To have strong cyber security, you must know cyber security definition, the importance of it and understand how cyber attacks work and affect your data, programs, computers, and networks. So, the article will introduce you to some forms of cyber attacks including cyber crime, cyber terror, and cyber war.protect its users and block unauthorized intruders from your wireless network.


Understanding Cyber Attacks

Cyber attacks can be dropped down into three: cyber crime, cyber terror, and cyber war.

1. Cyber crime
The attack includes the acquisition of debit/credit card data and intellectual property, and impairment of the operations of a web or service. All forms of cyber crime focus on stealing data or money and causing disruption.

2. Cyber terror
The attack includes terrorist activities on the cyberspace.

3. Cyber war
The attack includes espionage and sabotage against another nation in order to extract data or cause disruption.

Cyber attacks are done at a distance using numerous means of attack in malware (malicious software) domain.


There are many types of malware with each having its specific goal and technique.
  • Viruses
    Viruses are aimed to steal, modify, or corrupt data from targeted computers. A virus can replicate and spread itself from one computer to another by attaching itself to another file.
  • Worms
    Worms are aimed to seek out and exploit weaknesses in operating systems to allow remote control of the infected computers. A worm can replicate and spread itself from one computer to another without the need of attaching itself to another file.
  • Spyware
    Spyware, or also known as adware, is aimed to steal data through remote control of the infected computers. Spyware infects computers through attachments, links, or downloadable software.
  • Trojans
    Trojan is aimed to steal or damage data through the creation of another door on the infected computers.

Attack Vectors

Besides the above attacks, there are also some attack vectors that allow cyber criminals to infect computers to harvest stolen data.
  • Phishing
    Aimed to collect users’ data by masquerading as a legitimate entity.
  • Pharming
    Aimed to redirect a web’s traffic to a fake web where users’ data are compromised.
  • Drive-by
    Aimed to attack against specific weakness in a system.
  • MITM (Man in the Middle) Attack
    Aimed to manipulate impersonate each endpoint and manipulate them.
How to Strengthen your Network Security

1. Conduct Regular Risk Assessments
Understand what types of data are traveling through the network and taking appropriate steps to ensure that confidential data are secure. Analyze the types of data that are confidential. Risk assessments are crucial in order to understand how resources should be allocated to protect the entire network.

2. Scanning Data Entering and Leaving a Secure Network
Organisation can do multi-scanning to check files and data for threats before they enter or leave a secure network. Any files that contain threats, or do not meet the security policy defined for the network, can be blocked before they enter or leave a network. This also protect important and sensitive files with classified information from leaving the organisation.

3. Invest in Robust and Up-To-Date Network Security Technologies
Organisation can invest in network security solution to enhance security. New viruses and other forms of malware are created daily, therefore it is recommended for companies to setup and configure firewall according to their needs. With this, you are able to develop a plan to regularly update and check for threats.

Cyber criminals are indiscriminate. They will try to exploit every weakness within a system. Thus, all businesses will need to arm themselves with strong cyber data security support and website security support.
Why Do You Need to Engage an IT Consultant for IT Business Solutions?
12 ways to stay secure on public Wi-Fi
Visit Our Website
Our Affiliated Partner
Our affiliated partner, 3E Accounting Pte. Ltd., is a Singapore-based firm that provides professional incorporation, accounting, tax, immigration and compliance services for start-ups and small- to medium-sized firms.
Visit 3E Accounting Website
Notice of Holiday
   Our office will be closed on 24-25 December 2015 for Christmas Public Holiday
   We will be operating on 28 December (Mon) onwards.

Dear Clients,

We will have limited access to our e-mail during this period and might not be able to respond promptly. We will try our best to clear the backlog as fast as we can on the next business day. For urgent matters, please contact your Account Manager on their mobile phone.

We apologize for any inconvenience caused.
Greetings. You are receiving this email because you signed up for IT Solution mailing list on or you have been invited exclusively by us to join our mailing list. Occasionally, you will be receiving valuable insights and actionable advice on IT security, web technology, IT infrastructure etc. from IT Solution. 

If you no longer wish to receive these emails, click unsubscribe
Copyright © 2015 IT Solution Pte Ltd (201216738N)IT Solution Systems Pte Ltd (201310052W), 
All rights reserved.

Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list

Email Marketing Powered by Mailchimp