Cyber Attack Knowledge You Need to Read in 5 Minutes or Less

“The best defense is a strong offense.” We’ve heard this adage repeatedly, yet it certainly applies to Cybersecurity Month. Throughout October, you’ll find a myriad of helpful tips and tricks. You’ll read story after story on just how advanced these cyber attacks are. Here at 165 Halsey Street, we come from an informative place, always providing a solution and empowering you with knowledge. 

Research shows that “41% of the executives don’t think their security initiatives have kept up with their digital transformation.” This is an alarming percentage and should be addressed so organizations can make strides toward keeping their data secure. The first step? Awareness. 

There’s a wide variety of cyber attacks that the general public has not yet heard of. Perhaps you’ve been privy to these types of attacks, but some of them have unique names. Have you heard of these sneaky methods? What steps are you taking to prevent these types of attacks? Let’s dive in!


Starting with a self-explanatory term, keylogging is a form of spyware that infects a device and records your keystrokes. Most easily found in software, keyloggers do not threaten the entire system; rather they quietly operate behind the curtain to steal your personal information. These keyloggers can also take it to the next level and listen to you over your phone or webcam. How to watch out for this? Don’t open email attachments from unknown or suspicious senders aka phishing!

Whale Phishing

Whale phishing happens to be the most profitable form of phishing. This highly targeted method specifically attacks senior executives with the hopes of acquiring financial data. These whaling attacks aren’t as easy to detect as some of the phishing emails that we see regularly. These hackers are precise and intelligent. They carefully craft their messaging and with success, can steal millions from any organization. 

Man-in-the-Middle Attack

Don’t you just hate an eavesdropper? Especially the kind who listens in on your conversation at a coffee shop. How would you feel if this happened to you and you didn’t even know the person was there? We often heed warnings about checking your personal information while on public WiFi – and for good reason. These hackers essentially insert themselves in the middle of an information transfer. If that doesn’t send a chill down your spine, the hackers can also set up a program called “driftnet,” which listens to all of your network traffic, automatically plucking out images and then streaming them directly to the hacker where they can be saved for viewing. Top tips to avoid this? Be careful where you choose to log onto public WiFi! Only visit websites that are identified with “HTTPS” rather than “HTTP.” The S uses SSL technology that prevents these types of attacks. 

(Pro Tip: for private networks, not only do you want a strong WiFi password but a strong router password is key as well.)

You’ll find small challenges within our social media content this month to assist you in your journey toward keeping your data secure. With that, we hope you take some knowledge with you today to pass along to your organization and family. Instead of living in fear, feel confident you are taking the necessary precautions to have a safe online environment. Questions? Reach out to 165 Halsey Street here. We’re proud to provide our clients with top-tier colocation including zero cross-connect fees, excellent customer service, and a safe space for your data.