Energy Solutions Blog

Articles and news about energy solutions

The 5 most common cyberattacks in Data Centers

René Duarte
Posted by René Duarte on Apr 15, 2021 5:00:07 PM

Just as technology advances every day and grows enormously, the other side of the story tells that cyberattacks have also been implemented in a more personalized and professional way. Here we list the 5 cyberattacks that are currently a headache for Data Centers.


 Phishing: is a type of scam where hackers try to gain access to a network by spamming email or other methods of social engineering, the victim provides data and confidential information and thus they gain access to the network. For example, a cybercriminal can get you to “click” on a link and download something malicious to enter the network, or that link can take you to a fake site where you are asked to enter specific information about yourself and the company you work for.

DDoS (Distributed Denial of Service) - is an attack in which multiple sources target a web server, website, or other network device; They fill it with an avalanche of messages, packets, and connection requests until the target is "locked", thereby the data and the system in general are not available to users.

Malware: is a shortened term that means "malicious software". It is software specifically designed to gain access to damage a computer without the knowledge of the owner. There are various types of malware including spyware, keyloggers, viruses, worms, or any type of malicious code that infiltrates a computer with the aim of blocking or stealing information.

Password attacks: Also known as brute force attacks, they often use some kind of automated system to perform the attack using different password combinations (such as a dictionary list) to try to enter. The best way to prevent this type of attack from being successful is to implement practices where passwords for users, service accounts, and credentials change on a consistent schedule; that is, monthly, quarterly, etc.

Ransomware - This is the attack that keeps most security engineers, administrators, CSOs, and other IT personnel awake at night. It is a type of malware that locks and encrypts devices on a network to prevent someone from using them unless a ransom is paid. Once the payment is made, the encryption will be unlocked and removed; or in some cases hackers will not unlock the devices, causing the affected company to incur other costs to recover.

Topics: Datacenter