Some hackers steal data. Others hijack system resources. A few are vandals or pranksters. They use malware, guesswork or deception to exploit networks, and their methods are legion. Worms and viruses arrive as friendly attachments; then they wreak havoc. Phishers snag data using spoof emails. Packet sniffers grab it in transit.
Trojan horses launch spyware or exploit vulnerable ports, and key-loggers track your typing. Rootkits force 'zombie' computers to send spam or stage denial-of-service attacks, unknown to their owners. And low-tech tactics, such as cracking passwords by trial and error or making crank calls to helpdesks to obtain passwords, are as formidable as their more sophisticated cousins.
Combating cybercrime is a game of cat and mouse, and good managers keep abreast of trends. No system is impervious. PwC knows crime-ware, and our vulnerability assessments promote awareness, preparedness and detection. We excel at data compliance and network investigations, and our experienced EnCase examiners, malware experts and former law enforcement professionals are skilled in digital forensics and cybercrime. Recognize and respond to security breaches, and keep hackers at bay.
With cyber attacks posing unprecedented threats to the ecosystem, companies are beginning to understand that the real goal is to minimize, rather than eliminate, the damage and disruption they can do to the business. By considering threats now—instead of waiting until a breach is brought to light—they can limit the negative impact, such as the theft of research and development information, monetization of credit card data or financial records, rapid replication of product or process, access to strategic or customer information, and the disruption of operational stability.