Building or Purchasing Your Laboratory's LIMS – Part 3
April 14, 2019
Five Growing Cyber Threats of 2019 – Part 2
April 21, 2019
Building or Purchasing Your Laboratory's LIMS – Part 3
April 14, 2019
Five Growing Cyber Threats of 2019 – Part 2
April 21, 2019
Maintaining strong IT security requires an organization to stay current regarding the latest cybersecurity threats. However, even though hackers are becoming increasingly sophisticated, they often merely repeating methods that were previously successful. Cyber attacks are still taking advantage of common weaknesses such as unpatched exploits, insecure passwords, and single-factor authentication.

2019 will see an increasing number of companies migrate their computing and storage to the cloud. As a result, cybercriminals are ramping up their attacks against cloud computing, data centers, and mission-critical applications. Businesses must keep pace with their efforts to remain in regulatory compliance and ensure data security. The following will discuss the five growing cyber threats of 2019.


1) APT (Advanced Persistent Threat)


An APT allows a cyber attack to breach a network and remain hidden for an extended period. It uses stealth, avoiding detection by not calling attention to itself. Instead, it silently takes sensitive information, security data, and login credentials by deploying exploit kits and malware or mining the breached company’s data traffic.


2) Crypto-Jacking


Through the unauthorized use of someone’s computer, connected home device, mobile phone, or tablet, cybercriminals are mining for cryptocurrency such as Bitcoin. This is accomplished by tricking people into clicking on a malicious link within the body of email, which loads crypto mining malware into the computer. Another method is infecting an online advertisement or website with a JavaScript code that can auto-execute.

As the malware works in the background and is difficult to detect, users may not notice that their computers have been crypto-jacked. However, the scope of these attacks can be massive, allowing cybercriminals to rob an unsuspecting organization of tremendous CPU usage, resulting in slower performance of their systems and impacting their businesses and customers.

Part 2 will discuss Data Center and Cloud Attacks, Fileless Malware, and IoT Device Attacks.

Alpha Engineering Business Support

Choosing an expert computer technology-support provider is an important decision for your business. Alpha Engineering Associates has been a trusted partner of many companies in the Washington, Baltimore and Annapolis areas since 1990 and offer:

• 24/7 Managed Services for Business Computing Systems
• Network and Mobile Computing Support
• Disaster Recovery Planning
• Software Development

For affordable client-focused network consulting services and solutions, please call Alpha Engineering Associates today at (410) 295-9500.