{"id":2959,"date":"2016-04-01T07:38:27","date_gmt":"2016-04-01T06:38:27","guid":{"rendered":"https:\/\/www.conferencecall.co.uk\/blog\/?p=2959"},"modified":"2016-03-31T23:10:18","modified_gmt":"2016-03-31T22:10:18","slug":"what-is-a-cyber-attack","status":"publish","type":"post","link":"https:\/\/www.conferencecall.co.uk\/blog\/what-is-a-cyber-attack\/","title":{"rendered":"What is a cyber attack?"},"content":{"rendered":"<p>Have you ever been the victim of a cyber attack? If so you&#8217;re not alone &#8211; 2015 saw almost 300 million records leaked and over $1 billion stolen in online hacks.<\/p>\n<p>37 million people alone were affected in the <a href=\"https:\/\/www.conferencecall.co.uk\/blog\/ashley-madison-and-the-top-5-cyber-attacks-of-2015\/\" target=\"_blank\">Ashley Madison cyber attacks<\/a>.<\/p>\n<p>And a recent survey from Honeywell, a global technology solution company, found\u00a0three-quarters (75%) of adults across the globe fear becoming the victim of a cyber attack.<\/p>\n<p>So what&#8217;s the problem exactly?<!--more--><\/p>\n<h2>What is a cyber attack?<\/h2>\n<p>A cyber attack is an attempt by hackers to illegally enter, damage or bring down a computer system or network, often by planting malicious code or data via malicious software (malware).<\/p>\n<p>&nbsp;<\/p>\n<h2>Are cyber attacks impossible to stop?<\/h2>\n<p>The Honeywell survey questioned adults across 10 countries and found over a third (36%) don&#8217;t believe it would be possible to stop a cyber attack if terrorists struck.<\/p>\n<p>And more than a third (36%) don&#8217;t feel their nation&#8217;s leaders are taking the threat of cyber attacks seriously enough to be able to deal with one should their country be targeted.<\/p>\n<p>Respondents in India (61%), China (48%) and Mexico (47%) had the least faith in their governments&#8217; ability to deal with cyber attacks.<\/p>\n<h2>Prone to attack<\/h2>\n<p>The survey \u00a0also asked people which sectors they felt were most vulnerable to attack &#8211; almost two-thirds (64%) of respondents thought gas and oil refineries were most susceptible, closely followed by medical, health care, and pharmaceutical sites (64%), and electricity grids (63%).<\/p>\n<p>The UK government estimates cyber security breaches at British energy companies cost around \u00a3400 million.<\/p>\n<p>Almost all respondents from India (92%) are fearful of cyber attacks, with the Japanese (89%) not far behind.<\/p>\n<h2>No worries,\u00a0comrade<\/h2>\n<p>Conversely, Russians were the least fearful of attack, with just over half of respondents (53%) expressing any level of concern. Australia were just behind with 52%.<\/p>\n<p>Of those that weren&#8217;t too concerned about\u00a0a cyber attack, just under a third (31%) thought the chance of anything happening was actually very low, while a quarter (25%) thought an attack would already have happened if terrorists actually had the capabilities.<\/p>\n<p>Just under a quarter (24%) beleive\u00a0computer and internet security to be advanced enough to counter any threat, while as many people had faith in government and military intelligence to stop any attacks.<\/p>\n<h2>Everyday cyber attacks<\/h2>\n<p>While high level cyber attacks are uncommon, cyber attacks &#8211; or at least attempted cyber attacks &#8211; on individuals are more common.<\/p>\n<p>Among the most common type of cyber attack on the individual are phishing attacks &#8211; whereby fraudulent emails are sent to try and trick you into parting with sensitive information &#8211; and Trojan horse attacks &#8211; whereby innocent-looking computer programs actually contain malware that can scrape sensitive information from your system.<\/p>\n<p><a href=\"https:\/\/www.conferencecall.co.uk\/conference-call\"><img decoding=\"async\" class=\"alignnone wp-image-1777 size-full\" src=\"https:\/\/www.conferencecall.co.uk\/blog\/wp-content\/uploads\/2015\/05\/conference-call-banner.jpg\" alt=\"\" width=\"600\" height=\"118\" \/> <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever been the victim of a cyber attack? If so you&#8217;re not alone &#8211; 2015 saw almost 300 million records leaked and over $1 billion stolen in online<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/www.conferencecall.co.uk\/blog\/what-is-a-cyber-attack\/\">Read More<span class=\"screen-reader-text\">What is a cyber attack?<\/span><\/a><\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[17],"tags":[18],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is a cyber attack? - ConferenceCall.co.uk blog<\/title>\n<meta name=\"description\" content=\"2015 saw almost 300 million records leaked and over $1 billion stolen in online hacks. So what is a cyber attack? And should we be worried?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.conferencecall.co.uk\/blog\/what-is-a-cyber-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a cyber attack? - ConferenceCall.co.uk blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.conferencecall.co.uk\/blog\/what-is-a-cyber-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"ConferenceCall.co.uk blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Conference-Call-UK\/178511498997826\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-01T06:38:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-03-31T22:10:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.conferencecall.co.uk\/blog\/wp-content\/uploads\/2015\/08\/hacker.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Les Roberts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ConfCallUK\" \/>\n<meta name=\"twitter:site\" content=\"@ConfCallUK\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Les Roberts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/what-is-a-cyber-attack\/\",\"url\":\"https:\/\/www.conferencecall.co.uk\/blog\/what-is-a-cyber-attack\/\",\"name\":\"What is a cyber attack? - ConferenceCall.co.uk blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#website\"},\"datePublished\":\"2016-04-01T06:38:27+00:00\",\"dateModified\":\"2016-03-31T22:10:18+00:00\",\"author\":{\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/7c9b498e80a769b5ec7361479fa9e4a1\"},\"description\":\"2015 saw almost 300 million records leaked and over $1 billion stolen in online hacks. So what is a cyber attack? And should we be worried?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/what-is-a-cyber-attack\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.conferencecall.co.uk\/blog\/what-is-a-cyber-attack\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/what-is-a-cyber-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.conferencecall.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a cyber attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#website\",\"url\":\"https:\/\/www.conferencecall.co.uk\/blog\/\",\"name\":\"ConferenceCall.co.uk blog\",\"description\":\"Conference calling made easy\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.conferencecall.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/7c9b498e80a769b5ec7361479fa9e4a1\",\"name\":\"Les Roberts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/35588a095c072ad9300c7b3253934113?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/35588a095c072ad9300c7b3253934113?s=96&d=mm&r=g\",\"caption\":\"Les Roberts\"},\"url\":\"https:\/\/www.conferencecall.co.uk\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a cyber attack? - ConferenceCall.co.uk blog","description":"2015 saw almost 300 million records leaked and over $1 billion stolen in online hacks. So what is a cyber attack? And should we be worried?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.conferencecall.co.uk\/blog\/what-is-a-cyber-attack\/","og_locale":"en_GB","og_type":"article","og_title":"What is a cyber attack? - ConferenceCall.co.uk blog","og_url":"https:\/\/www.conferencecall.co.uk\/blog\/what-is-a-cyber-attack\/","og_site_name":"ConferenceCall.co.uk blog","article_publisher":"https:\/\/www.facebook.com\/pages\/Conference-Call-UK\/178511498997826","article_published_time":"2016-04-01T06:38:27+00:00","article_modified_time":"2016-03-31T22:10:18+00:00","og_image":[{"width":800,"height":534,"url":"https:\/\/www.conferencecall.co.uk\/blog\/wp-content\/uploads\/2015\/08\/hacker.jpg","type":"image\/jpeg"}],"author":"Les Roberts","twitter_card":"summary_large_image","twitter_creator":"@ConfCallUK","twitter_site":"@ConfCallUK","twitter_misc":{"Written by":"Les Roberts","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.conferencecall.co.uk\/blog\/what-is-a-cyber-attack\/","url":"https:\/\/www.conferencecall.co.uk\/blog\/what-is-a-cyber-attack\/","name":"What is a cyber attack? - ConferenceCall.co.uk blog","isPartOf":{"@id":"https:\/\/www.conferencecall.co.uk\/blog\/#website"},"datePublished":"2016-04-01T06:38:27+00:00","dateModified":"2016-03-31T22:10:18+00:00","author":{"@id":"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/7c9b498e80a769b5ec7361479fa9e4a1"},"description":"2015 saw almost 300 million records leaked and over $1 billion stolen in online hacks. So what is a cyber attack? And should we be worried?","breadcrumb":{"@id":"https:\/\/www.conferencecall.co.uk\/blog\/what-is-a-cyber-attack\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.conferencecall.co.uk\/blog\/what-is-a-cyber-attack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.conferencecall.co.uk\/blog\/what-is-a-cyber-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.conferencecall.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"What is a cyber attack?"}]},{"@type":"WebSite","@id":"https:\/\/www.conferencecall.co.uk\/blog\/#website","url":"https:\/\/www.conferencecall.co.uk\/blog\/","name":"ConferenceCall.co.uk blog","description":"Conference calling made easy","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.conferencecall.co.uk\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/7c9b498e80a769b5ec7361479fa9e4a1","name":"Les Roberts","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/35588a095c072ad9300c7b3253934113?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/35588a095c072ad9300c7b3253934113?s=96&d=mm&r=g","caption":"Les Roberts"},"url":"https:\/\/www.conferencecall.co.uk\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/posts\/2959"}],"collection":[{"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=2959"}],"version-history":[{"count":1,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/posts\/2959\/revisions"}],"predecessor-version":[{"id":2960,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/posts\/2959\/revisions\/2960"}],"wp:attachment":[{"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=2959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=2959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=2959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}