FAQ - Cyber Security

Updated: Nov 6, 2019

Why should i secure my website?

WEBSITES have always been a target for hackers and has been the source which are used by organized cyber criminals for spreading malware, running phishing campaigns (hosting fake login pages of Banks/Wallet players in website folders), etc.

WEBSITE SECURITY refers to maintaining the security of websites, web servers and web applications. A website is always prone to malware attacks. Hence website security includes scanning websites, servers and applications for malware and vulnerabilities, and includes timely detection and prevention of threats and vulnerabilities including malware threats, zero-day vulnerabilities, DDos attacks, brute-force attacks, etc. The focus is on data protection and includes sensitive data of customers as well.

cWatch Web is a Managed Security Service (MSS) operating in a Security-as-a-Service (SaaS) model. This means it is software (no appliance required) designed to protect your company's web activity. The web is a small businesses' principal venue for its IT operations and increasingly so for businesses of all sizes.

What is Endpoint security?

Endpoint Security or Endpoint Protection is a centralized approach to protecting all endpoints - servers, desktops, laptops, smartphones and other IoT devices - connected to the corporate IT network from cyber threats. This methodology enables efficient, effective and easier security management. Some vendors offer Endpoint Security systems that includes antivirus, firewall and other high defined security software.

When any device-smartphone, laptop, tab etc- is connected remotely to a network, the endpoint thus created would provide an entry point for threats and malware. Endpoint security management is all about adequately securing such endpoints and thereby securing a network by blocking access attempts and such risky activities at endpoints.

What is the difference between Endpoint Security and Antivirus Software?

It's to be understood that endpoint security software happens to be basically different from the antivirus software. In the case of endpoint security software, it's not an individual device that's protected; it's the network as a whole that is secured. The endpoints or endpoint devices, on the other hand, bear some amount of responsibility for their own security as well. This means that even when there is an endpoint protection software to safeguard a network, it's always necessary also to protect endpoint devices like laptops, smartphones etc with endpoint security antivirus or antimalware tools.

What is Cybersecurity?

The term Cybersecurity refers to the technologies and processes designed to defend computer systems, software, networks and user data from unauthorized access; also from threats distributed through the Internet by cybercriminals, terrorist groups, and hackers.

Cybersecurity is all about protecting your devices and network from unauthorized access or modification. The Internet is not only the chief source of information, but it is also a medium through which people do business.

Cybersecurity Definition:

Today, people use the Internet to advertise and sell products in various forms, communicate with their customers and retailers, and perform financial transactions. Due to this, hackers and cybercriminals use the internet as a tool to spread malware and carry out cyber attacks.

Cybersecurity aims to protect the computers, networks, and software programs from such cyber attacks. Most of these digital attacks are aimed at accessing, altering, or deleting sensitive information; extorting money from victims; or interrupting normal business operations.

Types of Cybersecurity

Cyber Security is classified into the following types:

Information Security

Information security aims to protect the users' private information from unauthorized access, identity theft. It protects the privacy of data and hardware that handle, store and transmit that data. Examples of Information security include User Authentication and Cryptography.

Network Security

Network security aims to protect the usability, integrity, and safety of a network, associated components, and data shared over the network. When a network is secured, potential threats gets blocked from entering or spreading on that network. Examples of Network Security includes Antivirus and Antispyware programs, Firewall that block unauthorized access to a network and VPNs (Virtual Private Networks) used for secure remote access.

Application Security

Application security aims to protect software applications from vulnerabilities that occur due to the flaws in application design, development, installation, upgrade or maintenance phases.

Types of Cybersecurity Threats

There are many different types of cybersecurity threats, some of the most common types of threats are listed below,


Viruses are a type of malware programs that are specially designed to cause damage to the victims' computer. Viruses can self-replicate under the right conditions and can infect a computer system without the permission or knowledge of the user.

It has two major characteristics, the ability to replicate itself and the ability to attach itself to another computer file. A virus has the capability to corrupt files and steal private information like credit card details of the user and send them back to the hacker.

Viruses cannot exist on its own, i.e., without a host program; it is usually present as a parasite on another program.

Piggybacking on another program allows the virus to trick users into downloading and executing it. When a virus-infected program is executed, the virus also gets executed. Once executed, malware virus performs two primary functions simultaneously: Replicate and Infect.

The virus takes control of the host computer and begins searching for other programs on the same or other disks that are currently uninfected. When it finds one, it then copies itself into the uninfected program.

After replicating itself into many copies and infecting other uninfected programs, host program returns to its original form. When the host program gets terminated by the user, the virus too will stop replicating. Since all these activities occur in the background, the user will be completely unaware of the virus.

Some viruses will remain active in the system memory even after the user terminated the host program. This type of virus will stay in system memory until the computer is turned OFF. The next time the user boots his computer system, he/she might unknowingly execute one of the infected applications on the computer.

When the virus remains active in the system memory, it may deliver the payload. The payload can be anything from deleting files or slowing down the computer. It could modify data files, damage or delete data files and programs.

Identity Theft

It is a type of cybersecurity threat which involves the stealing of personal information of the victims from social media websites such as Facebook, Instagram, etc. and using that info to build a picture of the victims. If sufficient sensitive information is gathered it could allow the cybercriminal to pretend as you in some way.

In some cases, hackers may steal the bank details of the victims and use it for their personal gain.

Password Attacks

It is a type of cybersecurity threat which involves a hacking attempt by hackers to crack the passwords of the user. With the help of a hacking tool, hackers may enter many passwords a second to crack the victim’s account credentials and gain access. Hackers may also perform password attacks on a computer login screen to gain access to a victim's computer and the data stored in it.

Spyware and Keyloggers

Malware such as the spyware can spy on computing habits of the victims. Some malware such as the keyloggers can record the victims' keystrokes including their passwords, PIN numbers, and credit card details. Keyloggers and spyware programs enter the victims' system when they download and install seemingly benign software from a dubious website.

Spyware and keyloggers gather user information, passwords, browsing history, etc., and then transmits them to its creators (hackers) who may sell or distribute this personal information to third parties. Hackers may also use that information to steal money from the victim's bank accounts.


Adware is a group of malware that is known to generate these pop-ups. If a user notices strange pop-up messages on their computer screen, it is most likely to be a malware attack. The main intention of adware is to gain permissions that will then allow them to install additional malicious software. If the user downloads that additional software, it may then either delete or steal your data. Some of these pop-up messages can also be used to simply bombard your computer screen with unwanted information such as advertisements.


Trojans are a type of malware programs that disguise themselves as harmless or useful software. Trojans can cause a variety of malicious activities on the victims' computer including downloading malicious programs, deleting or stealing files and providing hackers unauthorized access to the victims' computer.


Ransomware is a group of malware which locks or encrypts the victim's computer and demands payment for decrypting the computer. The primary motive for all ransomware attacks is always monetary.

Unlike many other types of cyber attacks, ransomware attacks notify the victim about the exploit, and it also gives instructions on how to recover from it (usually it demands payment for recovery). To avoid a crackdown by law enforcement, hackers who are behind the ransomware attacks typically demand payments in virtual currencies, such as the Bitcoins.

Since ransomware is one of the most prominent and widespread among all other cyber threats, let's have a closer look at how it operates.

Ransomware: Infection Mechanism

Ransomware infects a computer through various means such as through malicious email attachments, malicious links in shady websites. Most ransomware attacks are based on remote desktop protocol and other tactics that don't rely on user interaction.

Users may inadvertently download ransomware when they visit compromised websites. Ransomware malware can also piggyback on other malicious software applications as a payload. Some ransomware variants are known to spread through email attachments from malicious emails or released by exploit kits onto vulnerable computers.

Once the ransomware gets executed, it can change the victim's login credentials, encrypt files and folders on the victim's device, as well as on other connected devices.

In the first case scenario (changing the login credentials), ransomware shows a full-screen image or notification on the infected system's screen, which cannot be closed at the user's will. It may also have the instructions on how users can pay for the ransom and get the decryption key.

In the second case scenario (encrypting files and folders), the ransomware malware prevents access to valuable files like documents and spreadsheets.

Browser Hijacker

Some malicious software such as the Browser Hijacker redirects the victims' browser to specific websites that are chosen by the hacker or to a site that pays the hacker based on the number of hits it receives. In some cases of scareware infections, the entire root drive of the victims and all of their subdirectories will be hidden. It may also record their personal information and transmit it to the hacker.

Zero-Day Attacks

Zero-day attacks are carried out using zero-day malware. This zero-day malware exploits a previously unknown vulnerability that has not been addressed or patched. Since the zero-day vulnerabili