Cybercrime is not just for big business and Government agencies, in fact it is more prevalent among SMB's, where subtle vulnerabilities are more prevalent.


Cybercrime the term used to describe crimes directed at computers or other information communications technologies and crimes where computers or ICTs are an integral part of an offence

Cyber security is the practice of defending computers, networks, servers, mobile devices, data from malicious attacks

A Cyber-attack is an offensive manoeuvre to attempt to expose, alter, disable, destroy, steal or gain information through unauthorised access to or make unauthorised use of an asset

Cyber crime occurs at 5 levels

  1. Computer as a tool - Fraud, identity theft, phishing scams, spam, propagation of illegal material
  2. Computer as a target - Viruses, denial of service, malware
  3. Cyberterrorism - Government level attacks on foreign intelligence services and governments
  4. Cyberextortion - When a system is subjected to or threatened with repeated denial of service, ransomware or other attacks by malicious hackers
  5. Cyberwarfare - National-level attacks on other national-level agencies or infrastructure

Preventing or limiting cyber attacks

The Strategies to Mitigate Cyber Security Incidents is a prioritised list of mitigation strategies to assist organisations in protecting their systems against a range of adversaries. The mitigation strategies can be customised based on each organisation's risk profile and the adversaries they are most concerned about. This is known as the Essential Eight and is an all-embracing set of initiatives, ideal for small to large businesses.

The Essential Eight is split into three categories

1. Mitigation Strategies to Prevent Malware Delivery and Execution
To prevent the execution of unwanted applications, patch/mitigate computers with high-risk vulnerabilities, block unvetted macro's and disable unneeded features

2. Mitigation Strategies to Limit the Extent of Cyber Security Incidents
Restrict administrative privileges, know the benefit of using up to date operating systems and making it harder for adversaries to gain access

3. Mitigation Strategies to Recover Data and System Availability
Ensure data and business recovery after a cyber security incident

Contact Loyal I.T. Solutions today to learn more about how they can help you with protecting your business from Cyber Attacks.

Log a Job
Or an Enquiry

Loyal IT
Latest news

8 May 2024
5 Top Tips for Microsoft Outlook We highlighted in a previous blog the power of the calendar in Microsoft Outlook, and ho...
Read All Latest News

Our Clients

Always happy with Loyal’s work...

Vicki Field
Read All Testimonials

Resources Helpful
fact sheets

Download Our Fact Sheets

Sign Up for Newsletter