What are common types of cybercrime?
Cyber extortion
Cyber extortion occurs when a cybercriminal attacks or threatens to attack a computer, network or server and demands money to stop the attacks. Common examples of cyber extortion tactics are ransomware and extortionware. In these attacks, a bad actor encrypts a victim's files using malware until a ransom is paid for their release, preventing public exposure.
Understand ransomware
Cyber espionage
In cyber espionage, hackers attack corporations or governments for political, competitive or financial reasons. The goal is to gather intelligence while remaining covert.
Get global threat intel
Ransomware
Ransomware is a type of malware, or malicious software, that encrypts files and data on a computer. To install ransomware on a computer, hackers use methods like email phishing, malicious advertising or exploit kits. The malware takes control of specific files until the victim pays a ransom fee for their release.
Defend against ransomware
Phishing
Phishing uses fraudulent emails or other forms of communication to convince a target to give up sensitive information or system access. In a phishing attack, a user clicks on a seemingly legitimate but harmful link in an email, downloads a malicious file or gives away login credentials on a fraudulent site. This often leads to business email compromise.
Secure your emails
Malware
Malware is any type of malicious software distributed to a computer or network to steal its valuable information or damage its data. Malware can infect a network through email phishing, downloads from malicious websites, infected USBs or software vulnerabilities. Examples of common malware include spyware, worms or viruses, botnets and ransomware.
Get malware protection
IoT attacks
An IoT attack is an exploit of an Internet of Things (IoT) device, such as security cameras, manufacturing equipment, air quality monitors or smart utility meters. Attackers exploit vulnerabilities in IoT devices to gain control of the device, access sensitive data or break into other devices connected to the IoT system.
Explore IoT solutions
Domain Name System (DNS) tunnelling
DNS tunnelling is a DNS attack method of disguising malicious traffic, protocols or software as DNS queries and responses. Abusing the DNS protocol allows attackers to bypass firewalls and other defences and exfiltrate the target's data.
Conquer DNS tunnelling
SQL injections
A Structured Query Language (SQL) injection is a common type of cyberattack in which hackers exploit a security vulnerability in an application with malicious SQL code to gain access to a web application database. A successful SQL attack could allow a criminal to access protected sensitive data and modify or delete it.
Denial-of-service (DoS) attacks
In a denial-of-service attack, an attacker floods a system, server or network with traffic, making it unavailable to legitimate users. Attackers also use multiple compromised devices to launch a distributed DoS (DDoS) attack, a type of cybercrime that can be even more difficult to recover from.
Discover DDoS Protection
Zero-day exploits
A zero-day exploit occurs after a new network vulnerability is announced and before a patch is applied. During this window of time, systems are susceptible to cyberattacks as attackers target the disclosed vulnerability.
Detect zero-day vulnerabilities
How you can prevent cybercrime
Segment your network
Segmentation divides a network into smaller parts. This allows administrators to enforce access policies that control the flow of traffic and inhibit the spread of a cyberattack. Network segmentation can also improve operational performance and safeguard vulnerable devices from attacks.
Boost network management
Build zero-trust security
A zero-trust network continuously authenticates users and their devices at each access request. This is achieved through a combination of multi-factor authentication tools, device visibility, adaptive policies and segmentation controls. Zero-trust security can help protect organisations from common cybercrimes like phishing, malware and credential theft.
Discover zero trust
Deploy multi-factor authentication (MFA)
Activate multi-factor authentication on all possible online accounts. MFA adds two or more extra steps to verify a user's identity before authorising access to applications and resources. Implementing an MFA solution across an organisation can help prevent cybercriminals from accessing sensitive information.
See our MFA solution
Keep your software up to date
Regularly update your operating systems, devices and websites with current patches to safeguard your assets and data. Cybercriminals can exploit known vulnerabilities, or software flaws, to breach a system and steal or damage data. Organisations can reduce the risk of a costly breach by updating security software with the latest patches.
Optimise vulnerability management (VM)
Deploy vulnerability management software to identify and prioritise weaknesses in your organisation's environment. This solution can help organisations make data-backed decisions to proactively fix vulnerabilities before a cybercriminal has the chance to exploit them.
Read about VM
Use strong passwords
To help safeguard against cybercrime, use unique passwords, change your passwords regularly and avoid using the same password on multiple sites. A password manager application can be used to generate complex passwords and store them in an encrypted format. However, in the event of a breach, all passwords could be compromised.
Explore password security
Use email security best practices
Practising safe cyber hygiene with an email security solution in place can help prevent common cybercrimes like phishing, malware and spam. Here are some best practices:
- Use MFA or single sign-on (SSO)
- Don't click links or download files from unknown senders
- Create strong passwords
- Encrypt sensitive emails and attachments
Discover email security
Deploy integrated network security solutions
Many types of network security solutions can help protect your organisation's networking infrastructure from unauthorised access, data theft and damage. An intrusion prevention system (IPS) is an example of a network security solution. An IPS defends your network by scanning traffic to actively block attacks and prevent the spread of outbreaks.
See network security types
Back up data and test restoration
Secure your data by regularly backing up information and testing the restoration process. Effective data protection measures such as off-site backups, encryption and secure cloud storage are critical safeguards against cyberthreats like ransomware that could steal, damage or destroy your data.
Protect sensitive data
Create an incident response plan (IRP)
It is important for organisations to develop policies and procedures to follow in response to a security incident. An incident response plan instructs IT staff on how to detect a security incident, stop the attack and quickly recover from the event. Educate your team on the response plan and practise the process to minimise the length of a disruption.
Automate your IRP
Educate users on cybersecurity hygiene
Safeguard your workforce by educating users on cybersecurity policies and best practices. Train employees to:
- Identify phishing attempts
- Use unique, complex passwords
- Browse the internet safely
- Recognise social engineering tactics
- Back up data regularly
- Verify suspicious financial requests
- Use MFA
- Keep software updated
- Report cybercrimes
Read about cyber hygiene
What are types of cybersecurity solutions?
Firewalls
Firewalls use predefined security rules to decide whether to block or allow incoming and outgoing traffic. These barriers help prevent unauthorised access or malicious data from breaching your system.
Find your firewall
Extended detection and response (XDR)
XDR is an advanced cybersecurity solution that offers comprehensive threat detection and response capabilities. It correlates data from multiple sources across networks, endpoints and cloud environments to provide a unified view of potential threats. XDR's machine learning and analysis of vast data sets streamlines cybercrime investigation and response.
Discover XDR
Security Service Edge (SSE)
SSE is a group of technologies that secure access to the web, cloud services and private applications regardless of the location of the user, their device or where the application is hosted. SSE capabilities include threat protection, data security, access control, security monitoring and acceptable-use control enforced by network-based and API-based integration.
Security Service Edge is ready
Advanced Malware Protection
Advanced Malware Protection (AMP) is a type of antivirus cybersecurity software that provides robust defence against sophisticated malware threats. AMP protects computer systems by proactively identifying and blocking software viruses like worms, ransomware, Trojans, spyware and adware.
Detect and stop threats
Risk-based vulnerability management
A risk-based vulnerability management solution prioritises and addresses system weaknesses for remediation based on their potential impact and likelihood of exploitation. Proactively patching high-risk vulnerabilities first helps minimise cybercrime opportunities, enhance overall security posture and prevent potential attacks.
Start reducing risk
Cloud security
Cloud security solutions are technologies, policies and applications that protect online IP, services, applications, workloads and other critical data. A unified solution combines multiple security tools and features into a single platform, streamlining management and shielding users against cyberthreats wherever they access the internet..
Get cloud security
Email security
Email security is a crucial cybersecurity tool that protects organisations from a wide range of email-based threats. An email security application helps safeguard email communication from phishing attacks, malware, spam and other dangerous cybercrimes.
Secure your inbox
Access management
An access management solution controls user access to digital resources. It verifies identities through processes like MFA, SSO and passwordless authentication. User and device trust is continuously evaluated using adaptive, risk-based policies. This zero-trust strategy makes it harder for criminals to breach an environment and move laterally within it.
Discover Duo
Web security
Web security is a cybersecurity solution that works to safeguard online resources, devices and data from cyberthreats. It offers strong threat intelligence, dynamic content control and seamless user integration. Features like data loss prevention, strong authentication methods and deep visibility help organisations build a secure online environment.
Explore web security
Intrusion prevention system (IPS)
An IPS is a cybersecurity solution that actively monitors network traffic, identifying and thwarting potential attacks in real time. An IPS analyses global threat intelligence to block malicious activity, track the progression of suspect malware across the network and stop the spread of a breach and reinfection.
Meet Secure IPS