• XRATOR
  • Our Experts
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Cybersecurity

3 Persistent Myths about Cyber security

Gagandeep KohlibyGagandeep Kohli
May 24, 2022
in Articles, Cyber Attacks, Cybercrime, Risk Management, Scams, Threat Intelligence
0
Cybersecurity suffers a lot of myths

Cybersecurity is perceived as a complex topics by most of the people and a lot of false information and believes are circulating.

⚡Myth n°1 : I am safe on Mobile phone! Cyber attacks happen mostly on Desktop/ Laptops.

Mobile has over taken Desktop as most attacked channel with attacks on mobile app logins globally increased 138% year-on-year (2020-2021) while attacks on mobile payments grew by 63%.

According to BlackBerry Security, mobile users are more susceptible to phishing attacks, partly because they now spend more time on them. But also because of the smaller screen that reduce the ability to detect the scam.

The first quarter of 2022 saw a rise in deceptive mobile application in official Application Store, whose rely on fake comments and rating to push their way to the top application in their categories.

⚡Myth n°2 : Ransomware attacks happen infrequently

In 2016, one company was attacked by ransomware every 40 seconds. The number is now down to one company attacked every 11 seconds, according to Cybersecurity Ventures.

More than a third of global organizations were victim of ransomware attacks in 2021, with an average recovery cost of $1.85 million. Global ransomware damage costs is expected to exceed $265 Billion by 2031.

⚡Myth n°3 : Cyber attacks don’t attack Small Businesses (SMBs)

According to Barracuda Labs, employees from small business are 350% more targeted by social engineering attacks than an employees of larger enterprise. CEO and CFO are twice more attacked than regular employees :  “Small businesses often have fewer resources and lack security expertise, which leaves them more vulnerable to spear-phishing attacks, and cybercriminals are taking advantage”.

Cybercriminals are eager do create profitable criminal operation. They target the weakest link of the security chain and the ones than are the less prepared. It is not because one thinks he or she is not important for criminal, that crooks shares that analysis.

Tags: executiveransomwareSMBSocial Engineering

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • The H-Factor: Turning Human Into The Strongest Link Of Your Cybersecurity Strategy

    The H-Factor: Turning Human Into The Strongest Link Of Your Cybersecurity Strategy

    0 shares
    Share 0 Tweet 0
  • Understanding and Mitigating the Risk of Computer Memory Exploitation

    0 shares
    Share 0 Tweet 0
  • Three Social Impacts of Ransomware Operations

    0 shares
    Share 0 Tweet 0
  • Methods to Conduct an Insider Threat Risk Assessment

    0 shares
    Share 0 Tweet 0
  • Cyber War, Undefined By Military, Rationalized By Insurers

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
Preferences
{title} {title} {title}