-

Network attacks: how to protect your organisation

What are network attacks?

As workforces have become more mobile, employees no longer always work on a single trusted network, making security more difficult.

There are various different types of network attack, but all require the exploitation of an unsecured network. Where the network is not encrypted, an unknown third party may intercept communications that are being sent.

Emails are the main communication method for most companies, yet it is often forgotten how unsecure the communications are. An email can be thought of like a postcard — it can be read as it moves across networks.

It is therefore important that sensitive information is only sent over encrypted networks. Secure Sockets Layer (SSL) is the standard security technology for establishing an encrypted link between a web server and a browser.

Types of attack

Man-in-the-middle attack

In a ‘Man-in-the-Middle attack’ (MITM attack), the attacker intercepts the network and watches the transactions between the two parties. They are then able to steal sensitive information, such as account passwords, banking details, or customer data.

A common example of a MITM attack is ‘active eavesdropping’. This is when the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker is able to intercept all relevant messages passing between the two victims and inject new ones.


Distributed denial-of-service attack

A Distributed Denial-of-Service attack (DDoS attack) is when a hacker tries to bombard a website with traffic from multiple sources, causing the site to become overwhelmed and crash.

Attackers create a network of infected computers known as botnets by sending and spreading malware through websites, emails and social media.

Once the malware has been distributed it allows the hacker to launch an attack remotely, sometimes using a botnet of over a million different users, without their knowledge.

There are places on the Dark Web where it is possible to buy and sell botnets or individual DDoS attacks. For a small fee, a fraudster can disrupt an organisation’s online operations, causing them to lose out on sales and suffer from damage to their reputation.

Protecting your business against network attacks: a checklist

  • Use a Virtual Private Network (VPN) for remote access. VPNs add privacy and security to public networks and are used by corporations to protect sensitive data.
  • In the absence of a VPN, avoid unknown public Wi-Fi sources and only use trusted secure connections.
  • Websites should begin with ‘https://’ - the ‘s’ stands for ‘secure’, however this only indicates that the link between you and the website owner is secure, and not that the site itself is authentic.
  • Check the address for any subtle misspellings, additional words and characters, and other irregularities.
  • Configure routers to halt more simple attacks by stopping invalid IP addresses.
  • Use intrusion-detection systems (IDS), which can provide some protection against valid protocols being used against you in an attack.
  • Invest in DDoS mitigation appliances, which can help to block illegitimate traffic to your website.
  • Consider buying excess bandwidth that can handle spikes in demand. Alternatively, use an outsourced provider where you can buy services on demand, such as burstable circuits that provide more bandwidth when you require it.

What to do if your network has been attacked

If you believe you may have fallen victim to a network attack, contact us immediately. Our team will try to recover the money from the fraudster’s bank account. The quicker you alert your bank, the greater the chance of recovering the funds.

Report it to ActionFraud – the police’s national fraud and cyber crime reporting centre. Even if you’ve not suffered any financial loss, this will allow the police to analyse trends and help them to prevent fraudsters exploiting other companies. You can file a report via their website at www.actionfraud.police.uk^, or call 0300 123 2040.

If you have any queries, please speak to your Relationship Director.

Read related insights

Insights

Fraud Protection

Fraudsters are working as hard as you are. Our content can help you stay ahead of them.

insights

Navigating a changing threat landscape

Cybercriminals have identified new avenues through which to scam and defraud vulnerable individuals and businesses, so ensure your business is well-equipped to deal with fraudsters.

insights

Cyber Fraud Toolkit

What are the key cyber fraud threats your business may face today, and how can you mitigate those risks?

insights

Vishing and Smishing

What are vishing and smishing? These involve fraudsters making phone calls or sending texts to steal information. Find out how to spot them and protect your organisation.