{"id":2125,"date":"2017-03-28T07:42:28","date_gmt":"2017-03-28T12:42:28","guid":{"rendered":"http:\/\/www.stratospherenetworks.com\/blog\/?p=2125"},"modified":"2018-06-26T12:03:58","modified_gmt":"2018-06-26T17:03:58","slug":"5-common-tactics-hackers-use-target-businesses","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/","title":{"rendered":"5 Common Tactics Hackers Use to Target Businesses"},"content":{"rendered":"<p><a href=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/Security-breach-attack.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-2126\" src=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/Security-breach-attack-300x225.jpg\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/Security-breach-attack-300x225.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/Security-breach-attack-768x576.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/Security-breach-attack-1024x768.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Companies have lots of information to store, especially if they handle their business through online sales. This means credit card data, consumer history, purchase logs, and all sorts of valuable intel is ripe for theft by <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/11-ways-to-tell-if-youve-been-hacked\/\" target=\"_blank\">malicious third parties<\/a>.<\/p>\n<p>Of course, it\u2019s not always related to sales. Any time there\u2019s information worth stealing, a hacker is likely looking to take it. As a result, it pays to be prepared and understand what methods they use. For your benefit, we\u2019ve put together a list of five common tactics hackers employ.<\/p>\n<p><strong>1. Phishing scams.<\/strong> The simplest way to bypass security is to trick someone into letting you in. Hackers will do so by sending users <a href=\"http:\/\/www.stratospherenetworks.com\/what-you-should-know-about-phishing-malware-infographic.html\" target=\"_blank\">phishing emails<\/a>, which are usually disguised as legitimate messages from a company or a friend. Inside the email is usually a link. Once clicked on, either the link tries to harvest information from the user, or the user is asked to input a login for one of their accounts.<\/p>\n<p>Take extra care and watch out for any email that tries to disguise itself as official and then proceeds to ask you for login info. Be sure to check the sender\u2019s address and look for other telltale signs of a scam.<\/p>\n<p><strong>2. False WAP.<\/strong> If a business utilizes a <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/byod-what-small-businesses-should-know\/\" target=\"_blank\">BYOD policy<\/a>, this opens the door to a dangerous hacking method. Fake wireless access points (WAPs) used in public places can trick users into signing into the \u201cnetwork\u201d while a hacker steals information scoured from those using it. They\u2019re most common in public places, so it\u2019s best to have a strict remote <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/why-your-business-needs-to-ensure-endpoint-security\/\" target=\"_blank\">endpoint security policy<\/a> in place to counter it.<\/p>\n<p><strong>3. Filename delivery. <\/strong>Again, hackers often rely on human error to succeed. This is especially apparent with tricky filenames, where a file is given a specific title to encourage users to click on it. Once opened, it\u2019s likely the file was an executable that carries out a malicious process.<\/p>\n<p><strong>4. Switch processes.<\/strong> Back in the early days of anti-virus software, hackers would release \u201cdummy\u201d versions of these supposedly helpful programs, claiming a person\u2019s computer was infected. Upon running the program, it actually installed malicious hardware.<\/p>\n<p>The same method is still employed today, although with different software. Essentially, official looking programs are run and then switch their process to a malicious purpose, usually installing malware. Always make sure programs downloaded for work are actually well reviewed and safe.<\/p>\n<p><strong>5. Direct Denial of Service (DDoS).<\/strong> A DDoS is unlike the others in the list because it\u2019s not exactly subtle. It\u2019s an outright attack to stop a company\u2019s website from functioning altogether. This is done by overloading the target\u2019s servers with traffic to the point none of the online resources are usable anymore. This causes a loss of service, availability, and a few other frustrating problems.<\/p>\n<p>These are harder to deal with, as they require server maintenance and identification of the processes overloading servers. They are, however, usually temporary, and can be handled with the proper resources.<\/p>\n<p>Many other attack types exist out there as well, so it pays to be vigilant. Among them, though, these five are some of the most common hacking techniques used against businesses.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Companies have lots of information to store, especially if they handle their business through online sales. This means credit card data, consumer history, purchase logs, and all sorts of valuable intel is ripe for theft by malicious third parties. Of &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[192],"tags":[],"class_list":["post-2125","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-tips"],"yoast_head":"<title>5 Common Tactics Hackers Use to Target Businesses<\/title>\n<meta name=\"description\" content=\"IT security is a bigger concern than ever for businesses across all industries. Here are some common tactics hackers use that you should watch out for.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Common Tactics Hackers Use to Target Businesses\" \/>\n<meta property=\"og:description\" content=\"IT security is a bigger concern than ever for businesses across all industries. Here are some common tactics hackers use that you should watch out for.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-28T12:42:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-26T17:03:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"5 Common Tactics Hackers Use to Target Businesses\",\"datePublished\":\"2017-03-28T12:42:28+00:00\",\"dateModified\":\"2018-06-26T17:03:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/\"},\"wordCount\":540,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"IT Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/\",\"name\":\"5 Common Tactics Hackers Use to Target Businesses\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2017-03-28T12:42:28+00:00\",\"dateModified\":\"2018-06-26T17:03:58+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"IT security is a bigger concern than ever for businesses across all industries. Here are some common tactics hackers use that you should watch out for.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Common Tactics Hackers Use to Target Businesses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"5 Common Tactics Hackers Use to Target Businesses","description":"IT security is a bigger concern than ever for businesses across all industries. Here are some common tactics hackers use that you should watch out for.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/","og_locale":"en_US","og_type":"article","og_title":"5 Common Tactics Hackers Use to Target Businesses","og_description":"IT security is a bigger concern than ever for businesses across all industries. Here are some common tactics hackers use that you should watch out for.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2017-03-28T12:42:28+00:00","article_modified_time":"2018-06-26T17:03:58+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"5 Common Tactics Hackers Use to Target Businesses","datePublished":"2017-03-28T12:42:28+00:00","dateModified":"2018-06-26T17:03:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/"},"wordCount":540,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["IT Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/","name":"5 Common Tactics Hackers Use to Target Businesses","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2017-03-28T12:42:28+00:00","dateModified":"2018-06-26T17:03:58+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"IT security is a bigger concern than ever for businesses across all industries. Here are some common tactics hackers use that you should watch out for.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/5-common-tactics-hackers-use-target-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"5 Common Tactics Hackers Use to Target Businesses"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2125"}],"version-history":[{"count":1,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2125\/revisions"}],"predecessor-version":[{"id":2127,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2125\/revisions\/2127"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}