Overview of Common Cyber Attacks
The document “Common Cyber Attacks: Reducing The Impact” serves as a resource for organizations to understand the nature of typical cyber attacks and underscores the necessity for establishing fundamental security measures to defend against them. You can download the complete version at the bottom of this page (PDF).
This paper complements the recently revised “10 Steps to Cyber Security,” which provides extensive guidance on actionable measures organizations can take to enhance their network safety and data protection.
It’s important to note that this paper does not delve into a thorough examination of complex or persistent attacks, nor does it detail the mechanics of how such attacks are executed.
Overview of Common Cyber Attacks
The summary regarding common cyber attacks can be downloaded from the links at the bottom of this page, which outlines the security measures that can be implemented to reduce your organization’s risk of falling victim to a cyber attack.
The Evolving Threat Landscape
Before allocating resources to cybersecurity defenses, many organizations often seek tangible evidence demonstrating that they are, or may be, at risk from specific threats. However, accurately assessing the threats targeting individual organizations can be quite challenging in the digital realm.
Nonetheless, every organization stands as a potential target. There is always something of value that might interest malicious actors. If your organization reveals weaknesses in its cybersecurity practices by neglecting fundamental precautions, it is likely to encounter a cyber attack.
Mitigating Your Vulnerability to Cyber Attacks
Fortunately, there are practical and economical methods to lessen your organization’s vulnerability to prevalent types of cyber attacks, particularly for systems connected to the Internet. The following preventive measures are included in the Cyber Essentials checklist, along with further guidance on their implementation:
- Boundary firewalls and internet gateways – Create a network perimeter defense strategy that includes web proxy configurations, web filtering, content scanning, and firewall rules to detect and block harmful downloads, restrict access to known harmful websites, and prevent direct user computer connections to the Internet.
- Malware protection – Develop and uphold malware defenses to identify and respond to existing attack codes.
- Patch management – Regularly update software to address known vulnerabilities and thwart exploit attempts targeting software flaws.
- Allow listing and execution control – Block any unauthorized software from executing or installing autonomously, including features like AutoRun on USBs and CDs.
- Secure configuration – Limit the capabilities of every device, operating system, and application to only what is necessary for operational functionality.
- Password policy – Ensure the establishment and adherence to a robust password policy.
- User access control – Implement restrictions on the execution permissions of regular users while upholding the principle of least privilege.
If your organization anticipates being a target for more sophisticated attackers, increase your defenses by incorporating additional strategies found in the “10 Steps to Cyber Security”:
- Security monitoring – Employ systems to detect unusual or unexpected activities.
- User training and awareness – Ensure staff are aware of their responsibilities in maintaining organizational security and reporting any suspicious behaviors.
- Security incident management – Develop plans for responding to attacks, as effective responses can diminish the impact on your organization.
Enhancing Your Cyber Defenses
The Internet is inherently fraught with risks. The potential for attacks is constant, as new vulnerabilities arise and tools are created to exploit them. Inaction is no longer a viable option. Safeguard your organization and its reputation by implementing essential cyber defenses to avoid being added to the increasing tally of victims.
Based on an article from ncsc.gov.uk: https://www.ncsc.gov.uk/guidance/white-papers/common-cyber-attacks-reducing-impact