• The Scale of Cyber Security

The modern world is now heavily reliant on the internet. Websites and social media have become vital channels of communication allowing companies to interact and sell to customers.

Businesses are also providing employees and partners with online access to their systems, and facilitating flexible working through cloud computing.

As the significance of the internet has grown, so has the ability of cyber criminals to attack. Their incentive is driven by increasing value placed upon data, which is now a highly prized commodity across the world.

Data is now your IP       

As a result, the scale of the threat is at its highest level and organised gangs, nation states and even bedroom hackers worldwide are targeting some of the largest and smallest firms. With simple tool kits readily available on the internet for just a thousand pounds it’s never been easier for cybercriminals to attack.

Claim your free cyber security assesment here

Variety of attacks

What makes cybercrime so hard to tackle is that it is ever evolving, because technology has no set form, there are many different avenues of attack that a victim can fall susceptible to. The types of attacks listed below are just a short sampling of the threats that exist.

Denial of Service Attack:

Or DoS attack as it is also known as it an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the internet


This is the fraudulent practice of sending emails purporting to be from a reputable source in order to encourage individuals to reveal personal information, such as passwords, credit card numbers online as well as occasionally money through indirect means.

Water holing:

Creating either a fake or legitimate website in order to exploit users using it.


A type of malicious software designed to block assess to a computer system until a sum of money is paid


Similar to phishing but involves sending targeted emails to individuals that could contain an attachment with malicious software, or a link to download an infected file.

Subverting the supply chain:

To attack software or equipment that is being delivered to a business.

Claim your free cyber security assesment here


Claim your FREE Cyber Security Capability Assessment


View all Guides

Other Guides