Cybercrimes that pose the greatest threats to your business

Cybercrimes that pose the greatest threats to your business

Unfortunately, this year goes down the books as a flourishing one for hackers as they committed cybercrimes of huge proportions.

Before, hacking is mostly known for fraud and theft. Unfortunately in the past few years it has become more sophisticated as different kinds of enterprises suffered the brunt of massive data breaches that place disaster recovery plans in the forefront.

Let’s have a look back at some of the most unforgettable ones we saw in 2016:

  1. Ransomware in Hospitals

Hospitals and medical facilities are lucrative targets for ransomware. Hackers can “hostage” sensitive patient data in exchange for ransom money, which could rack up as much as $40,000. This was the value of 45 bitcoins that attackers earned from hacking Union Memorial Hospital in Maryland.

Several ransomware cases also caused hospital computer systems to shut down, including those in the Hollywood Presbyterian Medical Center, LA; Methodist Hospital in Henderson, Kentucky; and in Neuss, Germany. The medical staff was locked out of the hospital’s computer network, forcing them to perform record-keeping tasks through pen and paper.

  1. Bangladesh Bank Heist

A whopping $81 million disappeared from the infamous heist committed against the Bank of Bangladesh in early 2016. The hackers apparently stole the SWIFT (Society for Worldwide Interbank Financial Telecommunication) credentials of the bank’s employees to send fraudulent money transfer requests over at the Federal Reserve Bank of New York to bank accounts in the Philippines and Sri Lanka.

At best, a succeeding attack at the bank fumbled over a typo error. Otherwise, the total payout could have amounted to $1 billion.

  1. COMELEC Website Hacking

The Commission on Elections website was the subject of large-scale hacking in late March 2016, just before the Philippines was scheduled to conduct the May 2016 national elections. Not only was the site defaced, but voters’ data got leaked online as well, with the hacking group purportedly launching the attack to pressure the COMELEC to implement security features on the agency’s automated vote-counting machines.

  1. Yahoo! Data Breach

Yahoo! has been mired in turmoil ever since it announced just this September that a 2014 breach put millions of user account data at risk. The Internet giant reported anew this past week that a separate hacking incident in 2013 might have compromised another 1 billion more of Yahoo! users’ accounts.

Its chief information security officer, Bob Lord, explained that hackers used “forged cookies” – or the coding that gets stored in a user’s browser – to gain unauthorised entry to the accounts in question.

Yahoo! was quick to assure users that the hack did not involve any credit card and bank account information, but advised account holders to change their passwords immediately.

Suiting Up Your Business Against Cybercrime

Cyber security is always a concerted effort among managers, experts, and lower-level employees in the organisation. Here are some level-specific security measures that experts recommend:

  • Identify all risks related to cyber security such as those involving remote access to client information and fund transfer requests. Look into risks associated with third-party vendors as well.
  • Establish cyber security governance including policies, procedures, and oversight processes.
  • Be ready to detect unauthorised activities in your network.
  • Encrypt your data, use antivirus software, and keep your patch levels up-to-date.
  • Empower your managers to see how sensitive data flows through your system, and educate them about proper data sharing policies.
  • Monitor employees’ access to corporate data and set parameters for privilege use.
  • See to it that your current IT infrastructure can support the software version that you need.
  • Check any disparity between your organisation’s cyber security spending and actual implementation or usage of such security solutions.

The threat, as well as the danger of cybercrime is as real as it gets. Hackers will continue with their sinister ploy to disrupt businesses and online communities to further their own advances.

Needless to say, companies should not take this sitting down. By encouraging everyone’s involvement, your organisation can minimise the risks brought about by cyber crime.

[su_button url=”http://www.aim.ph/” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”15″ icon=”icon: arrow-circle-right”]Click here to find out more about Aim Corporate Solutions[/su_button]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Smart Home

Hackers are targeting your smart tech

Approximately 75% of UK households have at least one smart device connected to their home Wi-Fi, but could these devices…
Atlas Security

Atlas Security celebrates first year of business

Atlas Security, a privately-owned and purpose-led security services company, is celebrating a successful year of business in which it has grown by over…

Phoenix Datacom sets sights on major growth plans

Network Security and Performance Specialist Phoenix Datacom strengthens its senior management team to support its growth plans
Mayflex

Mayflex appoint new security Account Manager

Mayflex, the distributor of Converged IP Solutions, has appointed Sarah Long as an Account Manager to manage and develop accounts in the
NAKIVO

NAKIVO releases v10.4 with new features to enhance ransomware resilience

NAKIVO has released v10.4 of NAKIVO Backup & Replication with a focus on the security of backup data and ransomware protection.

Cyber security scorecard gives business real-time understanding of security risks

Huntsman Security has launched The Security Scorecard – the first tool of its kind to give instant visibility of an organisation’s Cyber Security Posture.

Intelligent Video: The key to transforming the in-store shopping experience

One challenge that retailers face is not having a way to collect accurate data and visualise it intelligently in order to make smarter business decisions.

Surveon Retail Solutions turn store security into profitability

Retail intelligence has certainly become the buzzword and retailers increasingly explore how it will impact their business this year and beyond.
Surveon Retail Solutions

Surveon Retail Solutions turn store security into profitability

Retail intelligence has certainly become the buzzword and retailers increasingly explore how it will impact their business this year and beyond.

Magnus Malmström named CEO of Nexus

Nexus Group, has appointed Magnus Malmström as its new CEO. He will move from his current role to replace Lars Pettersson, who will become chairman
Scroll to Top