Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns.

No cookies to display.

HomeBusinessInternet thieves target businesses through free online tools

Internet thieves target businesses through free online tools

-

Cybercriminals are increasingly targeting corporate employees who use free Web tools to access corporate systems.  Social-networking sites are the most popular where hackers gather personal data for usernames and passwords.

The most popular sources are AOL, Yahoo, MSN instant messaging, Yahoo Mail, Hotmail, Gmail, MySpace and FaceBook; the free tools that you’ll find open on millions of workplace PCs.
Many government and financial services firms block access to YouTube and other popular websites on work computers. But some organisations pay little heed to how employees use free Web programs; only a small minority actually pay for secure alternatives.
Most customised business applications used in commerce and government continue to be created with functionality, not security, as the top specification.
Randy Abrams, director of technical education at ESET, describes corporate data as “existing in a state of anarchy,” moving haphazardly about company networks with too few protections. “The bad guys are aware of this,” says Abrams. “Right now, there is little stopping them from moving data to places it should not be going.”
Criminal groups are turning data raided from corporate networks into cold, hard cash. Last week a corporate technology enterprise saw a notice on its trustworthy internal website that prompted workers to click on a link. Upon doing so they infected their computers with a virus that shut down their antivirus protection and spread across their entire network of over 300 computers, then copied the contents of their My Documents folder and transmitted them via the internet to a gang of hackers located abroad.
ESET recommends companies to assess potential threats to their data and have a defensive strategy in place, with regularly updated multi-layered protection (firewall, antivirus, anti-spyware and anti-spam), to counter new threats as they emerge.

- Advertisment -

Must Read

The Top House Pub & Kitchen 

The Top House Pub & Kitchen is conveniently located in Newtown Centre, whether you choose to relax by the fireplace indoors or enjoy the fresh...