TOTAL SECURITY FROM ALL
THE THREATS IN COMPANIES
Continuation of the previous blog. This is the Part 2 of
Company's IT Security That You Should Avoid
Here we go…
It is software that allows cyber intruders to access computers
without being detected to steal sensitive information. Rootkits
allow privileged access to a user (the hacker), who connects
remotely, altering the operating system to hide the maneuver.
A real risk for companies and users, who can have their
access codes, bank details, etc. stolen.
To be safe have an updated antivirus that will give you
complete security and fight again all the odds
Although there are also versions that work through devices or
hardware accessories, we are basically talking about
programs that can reach a computer through viruses, Trojans,
etc., and that are dedicated to memorizing the keystrokes
made by the user. The information is recorded in a file and
can be sent over the Internet.
As you can imagine, cybercriminals can get hold of all kinds of
passwords, bank details and any other kind of private
Man In The Middle Attack (MITM)
It is a type of attack in which the hacker intercepts traffic that
travels from a sending computer to another receiver. That is
why it is called Man in the middle, which in Spanish means
“Man in the middle”.
By becoming an intermediate point through which information
passes from its place of origin (an employee's computer, for
example), to a destination site (let's say it is the company's
server), the cybercriminal can decrypt the data and get hold of
keys and passwords.
Having the company website down for some time can lead to
significant financial losses, especially if it is an online store!
That is the goal of Denial of Service (DOS) attacks, or "denial
of service." A computer launches requests to the server where
the website is hosted until it saturates it and begins to deny
access. The web falls with its corresponding losses in sales,