Hacker Attacks

A hacker attack can strike like lightning from a clear sky. In recent years, several Danish companies have suffered hacker attacks. In November of 2020, a large news agency was hit, resulting in having to shut down their server and IT systems and not being able to publish news as usual. Instead, they were forced to take their emergency system into use. In December of 2020, a large American cyber safety corporation was hit by a hacker attack resulting in great consequences for the American government as well as for multiple other firms. It is no longer a question of if you will suffer a hacker attempt but a more a question of when.

Hackers and other cybercriminals attempt gaining access to your smartphone, computer, your data, and your systems by finding security loopholes, making you open e-mail attachments or click infected links in both e-mails or text messages. 

Some hackers also attempt gaining access to your mobile devices through public WIFI connections, so you should always be critical when logging onto a public wireless network.

Threat Assessment From the Center for Cyber Security

The Center for Cyber Security has published a new threat assessment regarding double extortion, which is a method that more hackers are starting to use. This means that they threaten to share the stolen information about e.g. customers or collaborative partners.

“It is important, that Danish authorities and companies consider the threat of leakage and resale of sensitive information into the preparation against targeted ransomware attacks,” says Thomas Lund-Sørensen, head of the Center for Cyber Security.

This article will present 7 tips to avoid hacking in your organisation.

Get 7 Tips to Avoid Hacking in Your Organisation Here:

  1. Train your employees in IT security, so they become more cyber aware. Knowing the techniques is not enough. A focus on human behaviour is also needed. 70-80% of all hacker attacks are caused by human mistakes and because of this, your employees need to learn good IT security habits.
  2. Hold the mouse over the link before you and your employees click on something in an e-mail, a text message, etc. If you do not trust the link, then do not open it. Do not open attachments from e-mail addresses, you do not trust. 
  3. Update programs regularly and use anti-virus so no security holes occur. 
  4. Make sure you and your employees use safe networks – on the go as well as when working from home.
  5. Have regular back-up procedures so the back-up happens frequently and according to a structured plan. This way you will easier be able to restore important files the hackers may have denied you access to, in case of attacks. 
  6. Update passwords regularly and make sure they are strong. Read more about strong passwords in our article
  7. Make sure to have clear guidelines in your IT security policy.

You can read our other tips regarding IT security here.

Facts About IT Security

According to numbers from Danmarks Statistik, 31% of Danish companies (with 250+ employees) experienced IT security breaches in 2019. Compared to 2018, this is a 27% increase in large firms experiencing IT security breaches.
Book a demo of the IT security awareness training
Book demo

A record number of phishing attacks was reported in 2020 – according to a study these attacks made up as much as 79% of all reported security incidents at the surveyed companies. This was an increase of 11% compared to the previous year. 

If you suspect that your work computer has been hacked, you need to contact the IT administrator at your workplace immediately. If you are hacked on your private computer and if credit card details, NemID information, information about your net bank or other sensitive information has been lured out of you, you must immediately report it to the police

If you suspect that your work e-mail is hacked, you must immediately inform the IT administrator at your workplace. If your private e-mail is hacked, it is a good idea to inform friends and family via other platforms to ensure that they will not open any files believing it is sent by you.

Comments are closed.