ICT Tools to prevent and recognize Cyber Risk in the Digital World
How do cybercriminals operate in E-skimming?
Cybercriminals steal banking and personal information from users of goverment websites
Cybercriminals steal banking and personal information from users of fraudulent online shops
Cybercriminals steal banking and personal information from users of legitimate online shops
An updated website with appropriate security features…
May suffer from social engineering attacks
is protected against all threats
If the website does not have an online shop, there is nothing to worry about.
What elements are included in a good prevention strategy?
Online security outsourcing - Communication channels – Information and prevention – Know what to do
Awareness team – Communication channels – Information and prevention – Know what to do
Trained managers - Communication channels – Information and prevention – Know what to do
What do we use a vulnerability scanner for?
To scan company computers for viruses and other threats.
To search for and report on what known vulnerabilities are present in an organization's IT infrastructure.
To scan corporate email for viruses and other threats
Brand and corporate image impersonation consists of:
Creating a copy of the legitimate website to sell products that it never ships
Stealink bank details from users of legitimate online shops
Using your web resources on a fraudulent website.