ICT Tools to prevent and recognize Cyber Risk in the Digital World
How do cybercriminals operate in E-skimming?
Cybercriminals steal banking and personal information from users of goverment websites
Cybercriminals steal banking and personal information from users of legitimate online shops
Cybercriminals steal banking and personal information from users of fraudulent online shops
An updated website with appropriate security features…
If the website does not have an online shop, there is nothing to worry about.
is protected against all threats
May suffer from social engineering attacks
What elements are included in a good prevention strategy?
Online security outsourcing - Communication channels – Information and prevention – Know what to do
Trained managers - Communication channels – Information and prevention – Know what to do
Awareness team – Communication channels – Information and prevention – Know what to do
What do we use a vulnerability scanner for?
To search for and report on what known vulnerabilities are present in an organization's IT infrastructure.
To scan corporate email for viruses and other threats
To scan company computers for viruses and other threats.
Brand and corporate image impersonation consists of:
Creating a copy of the legitimate website to sell products that it never ships
Using your web resources on a fraudulent website.
Stealink bank details from users of legitimate online shops