May 10, 2021
One of the most important parts of avoiding compromise is understanding how cybercriminals may attempt to gain access to critical data.
Attack techniques continue to evolve and become more sophisticated, giving cybercriminals a vast toolkit to use to exploit users.
Renee Tarun, ceputy chief information security officer and vice-president: information security at Fortinet, outlines some techniques to look out for: Social engineering attacks: Attacks such as phishing through emails and texts, where users are tricked into providing their credentials, clicking on malicious links or attachments, or going to malicious websites. Dictionary attacks: Attacker uses a list of common words, called the dictionary to try to gain access to passwords in anticipation that people have used common words or short passwords. Their technique also includes adding numbers before and/or after the common words to account for people thinking that simply adding numbers before and/or after