ICT Tools to prevent and recognize Cyber Risk in the Digital World
How do cybercriminals operate in E-skimming?
Cybercriminals steal banking and personal information from users of fraudulent online shops
Cybercriminals steal banking and personal information from users of legitimate online shops
Cybercriminals steal banking and personal information from users of goverment websites
An updated website with appropriate security features…
is protected against all threats
If the website does not have an online shop, there is nothing to worry about.
May suffer from social engineering attacks
What elements are included in a good prevention strategy?
Trained managers - Communication channels – Information and prevention – Know what to do
Online security outsourcing - Communication channels – Information and prevention – Know what to do
Awareness team – Communication channels – Information and prevention – Know what to do
What do we use a vulnerability scanner for?
To scan company computers for viruses and other threats.
To search for and report on what known vulnerabilities are present in an organization's IT infrastructure.
To scan corporate email for viruses and other threats
Brand and corporate image impersonation consists of:
Stealink bank details from users of legitimate online shops
Creating a copy of the legitimate website to sell products that it never ships
Using your web resources on a fraudulent website.