Proton

Malware and social engineering are the top two types of cybercrime methods businesses have to face. Here’s how to prevent these attacks from hurting your business.

Each quarter, the security firm Positive Technologies releases statistics on the most common types of cybercrime based on their internal data. The numbers(nuova finestra) from the fourth quarter of 2018 shed light on the illegal market for business data and fraud.

The six most common cybercrime attack methods against businesses are use of malware (including ransomware), social engineering, hacking (mainly attacks on servers or blockchains), web attacks (a subset of the hacking category involving injecting websites with malicious code), credential compromise, and distributed denial of service (DDoS).

We’ll use this list as a starting point to talk about prevention strategies. (Note: the total adds up to greater than 100% because of attacks that involve more than one type.)

1. Malware

Over half (55%) of all types of cybercrime involve malware, according to the report. These attacks include spyware and remote administration malware, which give attackers a back seat to everything you do on your device. From there, they can gain login credentials, sensitive business data, or information to help them conduct social engineering attacks. The third most popular kind of malware attack is the dreaded ransomware, which typically locks your device or takes your data hostage until you pay the hacker to release it.

How to prevent malware attacks:

  • Make sure your operating systems, applications, and plugins are running on the latest versions.

2. Social engineering

Social engineering attacks (31%) don’t rely on technical sophistication so much as trust. Because they prey on human vulnerabilities(nuova finestra) instead of technological ones, this type of cybercrime is especially difficult to guard against. Types of social engineering attacks include phishing(nuova finestra) and more elaborate physical schemes. For example, an attacker might leave an infected USB near the entryway to your office building in the hopes that an employee will insert it into their computer.

How to prevent social engineering attacks:

  • Maintain a healthy skepticism among your employees by creating a culture of security awareness(nuova finestra) in your organization.
  • Never click on links or download attachments in emails you weren’t expecting. If a trusted brand asks you to reset your password, do not click the link provided in the email. Better to navigate manually to the website and log in there.
  • Beware of cold calls, cold emails, unexpected office visitors, and lost USB sticks.
  • Limit the amount of information you provide on your company’s website, and discourage employees from listing their contact information on the Internet if possible.
  • In Proton Mail there are extra anti-phishing protections. For instance, all emails from Proton Mail have an Official badge; emails claiming to be from us without this badge are phishing attacks. Additionally, sender spoofing (in which the attacker manipulates the From address) is not possible in emails between Proton Mail accounts.

Learn more about DMARC protection, our report phishing feature, and other measures

3. Hacking

Typically the term hacking encompasses a wide variety of attacks. Positive Technologies defines it more narrowly in its report: “attacks that take advantage of vulnerabilities in software and services, weaknesses in protection mechanisms, and other shortcomings of targeted systems that do not involve social engineering or malware.” Examples include server-based attacks or the manipulation of blockchain-based services. One-fifth of the cyber crimes involved hacking.

How to prevent hacking:

  • Use only trusted services with a reputation for strong security. This includes your web hosting provider, cloud services, and IT contractors.
  • Put monitoring and accountability mechanisms in place for your employees to discourage insider attacks, including strict physical and digital access controls.
  • Make sure all software is up to date.
  • Invest in automated tools and security audits.
  • Encrypt all data.

4. Web attacks

Web attacks represent another fifth of cybercrimes against businesses. These attacks exploit vulnerabilities in websites to access the data of other users of the sites. For example, hackers might inject malicious code into an e-commerce website that allows them to steal customers’ credit card information.

How to prevent web attacks:

  • You can mitigate web attacks by only working with trusted web developers and using reputable third-party services.

5. Credential compromise

Seventeen percent of attacks involved credential compromise, meaning a hacker uses your login information to gain unauthorized access to your accounts. An attacker can learn your credentials in a number of ways: phishing, social engineering, malware (such as keyloggers), or hacking (gaining access to a database of credentials and cracking the passwords).

How to prevent credential compromise:

6. Distributed denial of service (DDoS)

Although few businesses will ever find themselves the target of a DDoS attack (2%), these can be extremely costly and disruptive. DDoS attacks flood a network with traffic, overwhelming it and preventing legitimate users or employees from accessing the service. Once the network is effectively shut down, the hackers typically demand a ransom to restore service.

How to prevent DDoS attacks:

  • Most DDoS attacks require the use of specialized services that use software to identify and divert malicious traffic.

You can mitigate most of these attacks by using trusted service providers that are committed to security. Proton Mail is the world’s largest end-to-end encrypted email service. Developed by CERN and MIT scientists in 2014, over 10 million people and businesses now use Proton Mail to secure their data and protect their privacy. Learn more about Proton Mail for business(nuova finestra).

Best Regards,
The Proton Mail Team

You can get a free secure email(nuova finestra) account from Proton Mail.

We also provide a free VPN service(nuova finestra) to protect your privacy.

Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan(nuova finestra). Thank you for your support.


Articoli correlati

The cover image for a Proton Pass blog comparing SAML and OAuth as protocols for business protection
en
SAML and OAuth help your workers access your network securely, but what's the difference? Here's what you need to know.
Proton Lifetime Fundraiser 7th edition
en
Learn how to join our 2024 Lifetime Account Charity Fundraiser, your chance to win our most exclusive plan and fight for a better internet.
The cover image for a Proton Pass blog about zero trust security showing a dial marked 'zero trust' turned all the way to the right
en
Cybersecurity for businesses is harder than ever: find out how zero trust security can prevent data breaches within your business.
How to protect your inbox from an email extractor
en
Learn how an email extractor works, why your email address is valuable, how to protect your inbox, and what to do if your email address is exposed.
How to whitelist an email address and keep important messages in your inbox
en
Find out what email whitelisting is, why it’s useful, how to whitelist email addresses on different platforms, and how Proton Mail can help.
The cover image for Proton blog about cyberthreats businesses will face in 2025, showing a webpage, a mask, and an error message hanging on a fishing hook
en
Thousands of businesses of all sizes were impacted by cybercrime in 2024. Here are the top cybersecurity threats we expect companies to face in 2025—and how Proton Pass can protect your business.