Here are some tips on common hacker threats; how to spot them, and how to react.
Malware
Spotting
Unusual system behaviour, like slow performance, unexpected pop-ups, or programs opening and closing on their own, can indicate malware.
Reacting
Run a full antivirus scan immediately, disconnect from the internet to prevent further spread, and remove any suspicious files.
Phishing
Spotting
Be wary of emails with urgent requests for personal information, generic greetings, misspellings, or from unfamiliar senders.
Reacting
Do not click on any links or download attachments. Verify the sender's identity through a different communication channel and report the email as spam.
SQL injection
Spotting
Unusual database errors or unexpected data entries can indicate an SQL injection attack.
Reacting
Review your website's code for vulnerabilities, particularly in areas that accept user input, and apply necessary security patches or updates.
Cross-Site Scripting (XSS)
Spotting
If users report seeing strange pop-ups or redirects when visiting your site, it might be an XSS attack.
Reacting
Make sure your website is set up to filter out harmful scripts. If you’re unsure how to do this, get in touch with a web developer or security expert to help fix the issue.
Denial of Service (DoS) attack
Spotting
Your website becomes unusually slow or completely inaccessible due to a sudden surge in traffic.
Reacting
Contact your hosting provider for support as they can often help filter out the bad traffic. Consider setting up systems that limit how much traffic your site can receive from one source to better handle these kinds of attacks in the future.
Ransomware
Spotting
You lose access to your files or systems, and a ransom demand appears on your screen.
Reacting
Disconnect from the network immediately and contact cybersecurity professionals for assistance in recovering your data.
Social engineering
Spotting
Unusual requests for sensitive information, particularly if they come from someone who seems to know you or your company.
Reacting
Verify the identity of the requester through a known, trustworthy channel, and educate employees on recognising and reporting suspicious interactions.
Please note, these tips are intended as guidelines only. Always seek professional advice where needed to ensure the best protection and support for your organisation.