ProtonBlog(new window)

Malware and social engineering are the top two types of cybercrime methods businesses have to face. Here’s how to prevent these attacks from hurting your business.

Each quarter, the security firm Positive Technologies releases statistics on the most common types of cybercrime based on their internal data. The numbers(new window) from the fourth quarter of 2018 shed light on the illegal market for business data and fraud.

The six most common cybercrime attack methods against businesses are use of malware (including ransomware), social engineering, hacking (mainly attacks on servers or blockchains), web attacks (a subset of the hacking category involving injecting websites with malicious code), credential compromise, and distributed denial of service (DDoS).

We’ll use this list as a starting point to talk about prevention strategies. (Note: the total adds up to greater than 100% because of attacks that involve more than one type.)

1. Malware

Over half (55%) of all types of cybercrime involve malware, according to the report. These attacks include spyware and remote administration malware, which give attackers a back seat to everything you do on your device. From there, they can gain login credentials, sensitive business data, or information to help them conduct social engineering attacks. The third most popular kind of malware attack is the dreaded ransomware, which typically locks your device or takes your data hostage until you pay the hacker to release it.

How to prevent malware attacks:

  • Make sure your operating systems, applications, and plugins are running on the latest versions.

2. Social engineering

Social engineering attacks (31%) don’t rely on technical sophistication so much as trust. Because they prey on human vulnerabilities(new window) instead of technological ones, this type of cybercrime is especially difficult to guard against. Types of social engineering attacks include phishing(new window) and more elaborate physical schemes. For example, an attacker might leave an infected USB near the entryway to your office building in the hopes that an employee will insert it into their computer.

How to prevent social engineering attacks:

  • Maintain a healthy skepticism among your employees by creating a culture of security awareness(new window) in your organization.
  • Never click on links or download attachments in emails you weren’t expecting. If a trusted brand asks you to reset your password, do not click the link provided in the email. Better to navigate manually to the website and log in there.
  • Beware of cold calls, cold emails, unexpected office visitors, and lost USB sticks.
  • Limit the amount of information you provide on your company’s website, and discourage employees from listing their contact information on the Internet if possible.
  • In Proton Mail there are extra anti-phishing protections. For instance, all emails from Proton Mail have an Official badge; emails claiming to be from us without this badge are phishing attacks. Additionally, sender spoofing(new window) (in which the attacker manipulates the From address) is not possible in emails between Proton Mail accounts.

Learn more about DMARC protection, our report phishing feature, and other measures(new window)

3. Hacking

Typically the term hacking encompasses a wide variety of attacks. Positive Technologies defines it more narrowly in its report: “attacks that take advantage of vulnerabilities in software and services, weaknesses in protection mechanisms, and other shortcomings of targeted systems that do not involve social engineering or malware.” Examples include server-based attacks or the manipulation of blockchain-based services. One-fifth of the cyber crimes involved hacking.

How to prevent hacking:

  • Use only trusted services with a reputation for strong security. This includes your web hosting provider, cloud services, and IT contractors.
  • Put monitoring and accountability mechanisms in place for your employees to discourage insider attacks, including strict physical and digital access controls.
  • Make sure all software is up to date.
  • Invest in automated tools and security audits.
  • Encrypt all data.

4. Web attacks

Web attacks represent another fifth of cybercrimes against businesses. These attacks exploit vulnerabilities in websites to access the data of other users of the sites. For example, hackers might inject malicious code into an e-commerce website that allows them to steal customers’ credit card information.

How to prevent web attacks:

  • You can mitigate web attacks by only working with trusted web developers and using reputable third-party services.

5. Credential compromise

Seventeen percent of attacks involved credential compromise, meaning a hacker uses your login information to gain unauthorized access to your accounts. An attacker can learn your credentials in a number of ways: phishing, social engineering, malware (such as keyloggers), or hacking (gaining access to a database of credentials and cracking the passwords).

How to prevent credential compromise:

6. Distributed denial of service (DDoS)

Although few businesses will ever find themselves the target of a DDoS attack (2%), these can be extremely costly and disruptive. DDoS attacks flood a network with traffic, overwhelming it and preventing legitimate users or employees from accessing the service. Once the network is effectively shut down, the hackers typically demand a ransom to restore service.

How to prevent DDoS attacks:

  • Most DDoS attacks require the use of specialized services that use software to identify and divert malicious traffic.

You can mitigate most of these attacks by using trusted service providers that are committed to security. Proton Mail is the world’s largest end-to-end encrypted email service. Developed by CERN and MIT scientists in 2014, over 10 million people and businesses now use Proton Mail to secure their data and protect their privacy. Learn more about Proton Mail for business(new window).

Best Regards,
The Proton Mail Team

You can get a free secure email(new window) account from Proton Mail.

We also provide a free VPN service(new window) to protect your privacy.

Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan(new window). Thank you for your support.


Protect your business with Proton
Get Proton for Business

Related articles

chrome password manager
You likely know you should store and manage your passwords safely. However, even if you are using a password manager, there’s a chance the one you’re using isn’t as secure as it could be. In this article we go over the threats some password managers
sensitive information
We all have sensitive personal information we’d all rather not share, whether it’s documents, photographs, or even private video. This article covers how to handle sensitive information or records, and what you can do to keep private information priv
Social engineering is a common hacking tactic involving psychological manipulation used in cybersecurity attacks to access or steal confidential information. They then use this information to commit fraud, gain unauthorized access to systems, or, in
is whatsapp safe for sending private photos
WhatsApp is the world’s leading messaging app, trusted by billions of people around the globe to send and receive messages. However, is WhatsApp safe for sending private photos? Or are there better ways to share photos online privately? Let’s find ou
passwordless future
With the advent of passkeys, plenty of people are predicting the end of passwords. Is the future passwordless, though? Or is there room for both types of authentication to exist side-by-side?  At Proton, we are optimistic about passkeys and have int
At Proton, we have always been highly disciplined, focusing on how to best sustain our mission over time. This job is incredibly difficult. Everything we create always takes longer and is more complex than it would be if we did it without focusing on