top of page
Search

Cybersecurity: An Overview

Technology has become increasingly popular as time progresses, being used in every aspect of life. From school, to work, to free time. Additionally, In the last couple of decades, smartphones have gained widespread popularity. In fact, a study done in 2022 by Pew states that 84% of Canadians own a smartphone. With these vast amounts of technology and its ease of use, attacks are guaranteed to occur.





Cybersecurity encompasses the process of securing programs, systems, and networks from digital attacks known as cyberattacks. Cyberattacks are attacks performed by hackers in an attempt to damage or destroy a computer system or network, mainly done for financial gain. Some examples of cyberattacks are, identity theft, extortion attempts, and the loss of important data.



There are a multitude of cyberattack types for different use cases. Some of the more well known attacks include:

  • Malware: Software used to gain unauthorized access to a system to cause damage

    • Some Types:

      • Viruses - Malicious code that attaches to files or programs

      • Worms - Self replicating malware that spreads without human action

      • Spyware - Secretly collecting user data without their knowledge

      • Ransomware - Block access to files/computer until ransom is paid


  • Phishing: Type of Social Engineering that sends fraudulent texts, emails, or calls to cause system damage

    • Some Types:

      • Spear Phishing - Attacks aimed at specific individuals or organizations

      • Smishing - Phishing through text (SMS)

      • Vishing - Phone scams

      • Whaling - Phishing attacks aimed at high level officials



Social Engineering is the process of exploiting human errors or weaknesses to gain access to sensitive information. This is done through direct interaction with the victims to lure them into compromising situations to give up sensitive data. According to Proofpoint, 98% of cyberattacks use some sort of Social Engineering technique to exploit the weakest area of cybersecurity - humans. Humans are susceptible to errors, manipulation and poor security habits. As such, targeting this area would yield better results for the attacker. It is also worth noting that attackers don’t have to target everyone in the company, but rather one user with just enough privileges to cause significant damage.



Social Engineering can be broken down into four stages. These four stages are designed for attackers to study their victims and perform an attack undetected. These stages include:

  • Research:

In his first step, attackers gather information about their victims. The

more information obtained, the better as this will help the attackers act more

naturally in the later stages. Attackers will use the information gathered to

determine potential points of entry to the victims system/network to achieve a

goal the attacker has in place.

  • Engagement:

After obtaining as much information as they can, the attackers apply one of the

social engineering techniques to make contact with the victim and try to gain their

trust.

  • Exploitation:

In this stage, the victim has come to trust the attacker, and in turn the attacker

has learned about the victim's weakness. The weakness will be exploited to gain

sensitive information and cause damage.

  • Exit:

If the attack has come to this step, that means the attacker has succeeded in

using the victim to achieve their goal. The attacker will now end communication

with their victim and cover their tracks. It is important for the attacker to end

communication in a very natural way to avoid arousing suspicion.



In this age of technology, it is vital that we take the necessary precautions to protect ourselves from potential threats and attacks. Some of the steps you can take to prevent attacks on your system are:


  • Implement Two Factor Authentication (2FA) for your logins

  • Train employees on best security practices

  • Never click on suspicious links

  • Ensure you’re using a strong password that you’re not using for other accounts



References:

Chrissy Kidd, and Muhammad Raza. “What Are Social Engineering Attacks? A Detailed Explanation.” Splunk, www.splunk.com/en_us/blog/learn/social-engineering-attacks.html.

“Cyber Security.” IT Governance, www.itgovernance.co.uk/what-is-cybersecurity.

Team, RangeForce. “Tutorial: The Four Phases of Social Engineering.” Rangeforce, RangeForce, 29 Dec. 2023, www.rangeforce.com/blog/four-phases-of-social-engineering

“What Is Cybersecurity?” Cisco, 14 Mar. 2025, www.cisco.com/site/ca/en/learn/topics/security/what-is-cybersecurity.html.

“What Is Social Engineering? - Definition, Types & More: Proofpoint Us.” Proofpoint, 2 Dec. 2024, www.proofpoint.com/us/threat-reference/social-engineering#:~:text=How%20Common%20Is%20Social%20Engineering,target%20in%20social%20engineering%20attacks.

 
 
 

Book your Consultation Today!

Let's get in touch and talk about your data needs! 

info@datasolutionsinc.ca

Book Meeting

LinkedIn

  • Instagram
  • Facebook
  • LinkedIn
  • TikTok

Thanks for submitting!

© 2023 by Data Solution Inc. Powered and secured by Wix

bottom of page