• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About Techie She
  • Contact
  • Privacy Policy

Techie She

  • Blogging Stuff
  • Freebies & Deals
  • Tips & Tutorials
  • Blog Themes & Designs
  • Techie Matters
You are here: Home / Techie Matters / 7 Identified Threats Against Your Data

7 Identified Threats Against Your Data

In this age of information technology, people can easily access information by just a click of a mouse. This ease of information access both has its advantages and disadvantages. Knowledge used for good purposes is a good thing but among the disadvantages are the seven identified threats that I’ll mention below:

1. MALWARE MENACE

Malware aims to infiltrate a computer without the owner’s consent leading to, capturing of passwords, replacement of vital system executables and control key functions via rootkits and an array of other viruses, worms and Trojan horses (among other things).

2. ATTACKS ON WEB BROWSERS / HOSTILE EMAIL ATTACHMENTS

Web browsers and emails are convenient targets and are the easy way in for thieves into an organization. For example, thieves may use pop-up ads to indicate that a computer is infected with malware and a link to download a program to fix it. Only, instead of fixing it, the “fix” contains an malicious code that does more damage than good. Spam emails containing potentially dangerous links and messages are also an example of this problem.

3. SQL INJECTION ATTACK

SQL injection attacks allow attackers to insert malicious codes into strings that are passed to a SQL server via an SQL injection that corrupts the application layer of a website. This allows the thieves to vandalize pages, steal credit card and other data and manipulated databases.

4. CONFIGURATION MANAGEMENT / PC LOCKDOWN

People usually focus on attackers outsde the organization but there is also a internal risk involved like when employees, contract workers, consultants and others gain access to systems that they are not entitled to use or when information is shared with those who are not authorized to view them.

5. PASSWORD ISSUES

Passwords allow users to use and enter into a system – and a compromised password could create lots of potential problems. Passwords should be confidential, strong and hard to guess. In addition, there should be some type of authentication technology that offers the advantage of knowing who’s logged into a system.

6. WIRELESS SECURITY

Thieves can gain access to valuable information by hacking into unsecured Wi-Fi connection, gaining access to mobile devices utilizing the wireless connection or capturing data over the air.

7. LOSS OF MOBILE DEVICES

Some organizations allow employees to store data in mobile devices. Unfortunately, researches show that about 10% of notebooks and other mobile devices end up lost or stolen – and over 95% of them are never recovered.

Related posts:

5 Common Types of Cyberattacks Detected by an IPS laptop securityHow to Protect Your Home or Office Data Default ThumbnailMachine-to-Machine or M2M Technology Default ThumbnailHow to Protect Your Password

Techie Matters >>> computers, cyberattacks

Primary Sidebar

The Latest from the Blog

power-transformer-electrical-workers

Innovative Trends in Transformer Technology

temperature sensor checking transformer

The Versatility of Temperature Sensors in Everyday Applications

black screen with active cursor

Black Screen With an Active Cursor After a Problematic Windows Update

seo-backlinks-analysis-content-ranking

The Art of Building Quality Backlinks for SEO

Topics Discussed

  • Blog Themes & Designs (41)
  • Blogging Stuff (53)
  • Business & Marketing (87)
  • Contests and Giveaways (71)
  • Features (68)
  • Freebies & Deals (45)
  • Techie Matters (187)
  • Tips & Tutorials (35)
  • Uncategorized (5)

Archives Link

Copyright © 2025 Techie She on the Brunch Pro Theme