fbpx
8833 South Redwood Road
Suite C
West Jordan, UT 84088

Call For Free Consultation

(801) 676-5506


Call Us

Cyber Attack Law

Cyber Attack Law

The term cyber attack refers to any number of ways a criminal may attempt to damage or access sensitive information from a computer or networked device. The frequency and sophistication of these attacks continue to increase dramatically, while law enforcement and computer security companies frantically try to keep up. Entrepreneurs must wear many hats to be successful and can’t be expected to have technological expertise. However, it’s important for all business owners to become familiar with the most common types of cyber attacks.

How to Deal with Viruses

Viruses are perhaps the most familiar type of computer-related offense. They are programs or pieces of software code that are loaded onto your computer (or smartphone) without your knowledge, often by enticing the user to open an email attachment. Viruses can compromise a computer or an entire business network in a number of ways, including the deletion or corruption of files. New viruses hit the Internet every day, according to the Better Business Bureau.

  • Defenses – Antivirus software is widely available and should be regularly updated; train employees about the common ways computer viruses are spread; infected computers should be taken offline immediately.

What Should You Do with Spyware

Your computer may be infected with spyware without your knowledge. This type of malware (software used for nefarious purposes) secretly collects information from a computer, which can include credit card numbers and Social Security numbers, typically recording the keystrokes of the user. Spyware sometimes is used by marketers and spammers, covertly installed along with a downloaded application, but also can be used for credit card fraud and identity theft.

  • Defenses – Search online for anti-spyware software, some of which is free of charge; some signs that your computer may be infected with spyware include frequent pop-up ads, sluggishness and changed settings.

What about Phishing?

Chances are, you have received an official-looking email attempting to trick you into verifying your personal information at least once in the past few years. This is called “phishing,” and can also take the form of a fake web site attempting to take advantage of user mistypes (for example, typing “paypak.com” instead of “paypal.com” and being taken to a site that looks like paypal.com but isn’t). In a business setting, a phishing attack may try to get an employee to give up the password to a customer database.

  • Defenses – A good spam filter may help block a majority of phishing attempts, but a well-informed workforce may be the best defense; also, check for the secure connection icon (a closed padlock) in the browser when transmitting sensitive data.

What is Pharming?

Similar to phishing, pharming redirects a web site request to a fraudulent site that closely resembles the intended one. The criminal hacks into the server to embed the malware so that users who type in a given address are automatically redirected to the fake site, which then collects information given by the user.

  • Defenses – Like phishing, an informed workforce is probably the best prevention to workplace pharming attacks; if a web site redirects to another address without providing an indication to the user, it could be a pharming attempt. Use an intrusion prevention systems and network scanners to secure your company’s web server.

Keyloggers, Bots, and Trojans are Issues as Well

These are applications that appear useful or at least benign, sometimes taking the form of screen savers that entice the user to download them. But they carry viruses or other malware that can be destructive to computer files and may compromise data security. The user is often unaware they even exist but the implanted malware can send sensitive personal information to a third party.

  • Defenses – Some companies have strict policies pertaining to the types of files employees may or may not download and install; regular virus and malware scans can help detect such attacks after the fact.

 

Cyber Attack Lawyer Free Consultation

If you’ve been a victim of a cyber attack and need legal help, then call Ascent Law for your free consultation (801) 676-5506. We want to help you.

Michael R. Anderson, JD

Ascent Law LLC
8833 S. Redwood Road, Suite C
West Jordan, Utah
84088 United States

Telephone: (801) 676-5506

Ascent Law LLC

4.9 stars – based on 67 reviews


Recent Posts

Electronic Signatures on Contracts

Effects of Divorce on Children

Setting Up a Trust

Leading Cause of Divorce

Driver Charged with DUI

Finance and Banking Law

Share this Article

Michael Anderson

About the Author

People who want a lot of Bull go to a Butcher. People who want results navigating a complex legal field go to a Lawyer that they can trust. That’s where I come in. I am Michael Anderson, an Attorney in the Salt Lake area focusing on the needs of the Average Joe wanting a better life for him and his family. I’m the Lawyer you can trust. I grew up in Utah and love it here. I am a Father to three, a Husband to one, and an Entrepreneur. I understand the feelings of joy each of those roles bring, and I understand the feeling of disappointment, fear, and regret when things go wrong. I attended the University of Utah where I received a B.A. degree in 2010 and a J.D. in 2014. I have focused my practice in Wills, Trusts, Real Estate, and Business Law. I love the thrill of helping clients secure their future, leaving a real legacy to their children. Unfortunately when problems arise with families. I also practice Family Law, with a focus on keeping relationships between the soon to be Ex’s civil for the benefit of their children and allowing both to walk away quickly with their heads held high. Before you worry too much about losing everything that you have worked for, before you permit yourself to be bullied by your soon to be ex, before you shed one more tear in silence, call me. I’m the Lawyer you can trust.