(Video) What to look for in a Cyber Attack!

Roger Smith, CEO at R & I ICT Consulting Services Pty Ltd and Amazon #1 author on Cybercrime discusses –  What to look for in a Cyber Attack

[Start of transcript]

Hi. My name is Roger and today I’d like to talk to you about what to look for if your business is under attack from – under a cyber-attack. Now, there are a number of things that actually show that something is happening to your systems that you do not know about or have no control over. One of the most important things that you can do for your business is set up a thing called Google Alerts.

Now if you go to a Google Alerts setup that says Name of Business, Name of main people, name of widget, name of service, name of support and put it on to the thing so it delivers information to you every day whenever those criteria are met. Then you will find that not only will someone be — someone maybe talking about you, it may be good or bad – you may be in a situation where you will catch the first patch of a [Indiscernible 00:01:06] attack on your business.

By having that information coming to you as an email you are in a position where you can see that you’ve upset anonymous, for instance. And anonymous have now gone out and maybe a video that says we’re going to attack xyz company on this date and this time, who’s in? And now all the script kiddies out there are quite happy to join in because they don’t like xyz company either. But they don’t understand that the underlying system of an attack will be managed docs attack on your IP range followed by the nasty people who are the good old hackers coming in on the all of the traffic that’s happening and stealing [Indiscernible 00:01:58] and you don’t want to be in that place.

In other words, I’m saying is that if you’re under a cyber-attack or if your system has a virus or is being affected with malware or has a worm or a Trojan, all of these things will show up in some way? Not always, but most of the times. There is malware out there that would do a number of really drastic things to your system but they’ll only do that to your system if you have a certain component on it.

Some of the nasty malware, things like Stutsnet and Duka were specifically looking for a type of computer that was connected to another system. And when they found it they did a lot of nasty things. But if they wouldn’t find that they just sat there and didn’t do anything. Most of the times when it comes to malware and worms and viruses your computer and your laptop and your mobile phone and your tablet will show certain things are wrong.

It will show that the system is really slow. Or it’s got a large amount of information going out to the internet. And it may not be critical information. It might set up a directory on your PC, it is now [Indiscernible 00:03:26]. You don’t want to be in that situation. You really don’t because even though it’s not your responsibility, the police get really upset about that.

So when you are sitting there thinking about what needs to be done for your computer to make sure that you are in the middle of a cyber-attack, those are the things that you really need to look at. How much traffic is going out? Is it really really slow? Has it got application drain that you have no idea about and you need to do something about it?

Thank you very much.

[End of transcript]

 

Roger Smith, is an educator. Teaching students at ADFA (UNSW) and showing them how vulnerable they are to cybercrime.

He is also CEO at R & I ICT Consulting Services Pty Ltd, an Amazon #1 author on Cybercrime and founder of the SME Security Framework. He is a Consultant who specialises in inexpensive and highly effective security strategies for small and medium businesses and not for profit organisations.

He has developed and authored the SME Security Framework and the Security Policy Training Course which are considered to be the definitive guides to helping SME’s protect their organisation using the principles of Technology, Management, Adaptability and Compliance.