Find the worst computer attacks ever

On the eve of Halloween, let’s talk about a theme that is a true horror film for IT managers: computer attacks! It is no wonder that computer attacks are increasingly sophisticated and occur more and more frequently. From “simple” password theft to the removal of important files, hackers are becoming more creative and companies have the obligation to take appropriate measures to combat these attacks. In today’s article, let’s get to know the 5 worst computer attacks ever!

Attack on RSA Security

In March 2011, security companies Symantec and Kaspersky were victims of several attempts to hack into their databases. However, the biggest affected by the wave of attacks was RSA Security, which saw its data being stolen by hackers who were never identified. This is a very serious situation as RSA Security is responsible for developing solutions that ensure that thousands of systems are protected from intrusion. When not even a company of this quality is safe, it means that the average user must be very careful and very afraid of any attacks!

“The Homeless Hacker”

Adriano Lamo invaded the systems of the New York Times, Google, Yahoo and Microsoft and was arrested in 2003. He became known as the “homeless” hacker because he did his actions from cafes and libraries. He was arrested after 15 months of investigation and currently fights against computer attacks. He recently denounced Chelsea Manning, a military man who stole confidential US government data.

ASTRA

This hacker has never been publicly identified. It is believed to be a 58-year-old mathematician, arrested in 2008 after hacking into Dassault’s information systems. For five years, ASTRA has been able to steal confidential information from military aircraft, selling it to people from different countries and causing a loss of $ 360 million to the company.

MyDoom Virus

MyDoom was a virus that caused major damage in 2004. It reached users through e-mail and managed to create access to the computer’s operating system, gaining the freedom to do all the damage it wanted. This virus could also fake emails and automatically create a database with emails from future victims.

Test of size and knowledge of the Internet

A test to know the size of the Internet was made in 1988. On that day, Robert Tappan Morris recorded his name in history forever, but not for the best reasons. He was the creator of one of the greatest virtual plagues ever. The worm he created was out of control and infected thousands of computers, which failed to work properly in a short time. Many companies have lost thousands of dollars because of this attack. Morris had to pay a substantial fine and serve community service. The worm code he created today is displayed on a prominent disk in the Boston Science Museum.

The computer attacks are truly terrifying. And today is a very playful day of this kind. Protect your data and have a good Halloween!

4 Myths about information management

Myths about information management

Managing information and data in companies is one of the main concerns of managers and is a topic that has been in vogue in last months. Threats to information security appear more and more in more and more varied forms and it is difficult to manage all the data of the companies in a safe and effective way. In this article, we will demystify 4 generalized ideas about information management that will help you better manage your company’s data!

Myth: data security can no longer be guaranteed

Computer attacks are increasing and there is increasing variety in attack forms. However, it is possible to reformulate information security strategies and change some routines: checking your antivirus regularly, changing passwords frequently and choosing good Cloud services are some tips to ensure greater security of internal information.

Myth: we cannot prevent, just react

The most frequent threat today is called ransonware. In this attack, hackers steal data and request redemption in BitCoins to return them to the company. This attack occurs by sending an email to a company employee who opens it without realizing it is a threat. A malware download is automatically downloaded to the computer. This shows us that investing in employee training is essential. Awareness-raising campaigns on the importance of information security is a form of prevention.

Myth: upgrade the systems ensures the protection

In fact, a system upgrade can pose an even greater threat to data security. It is essential that companies test the upgrades in their own environments before starting to effectively update the system. This way you can detect threats and eliminate vulnerabilities of the update.

Myth: Information management only concerns IT managers

In an organization it is essential that all employees are committed to the issue of safety. That is why the awareness campaigns for this topic are so important. The responsibility of protecting the confidential business data is of everyone who works there. In addition, the more information that managers gather, the more confidence they will have when making decisions. Big Data and real-time data analysis are two growing trends that are changing the way we manage business information.

Protecting your company’s information is critical so you can ensure that no confidential information is passed abroad. Prevention and training of employees together is the key to ensuring that data is protected and secure. Products such as Datapeers are increasingly needed in today’s business environment as they enable the protection of information and ensure compliance with the new data protection regulations, which will enter into force in May 2018 in the European Union.