Eastern Telecom explains cyberattacks happen and totally disrupt business

Cyberattacks that may harm your business and how to deal with it

Adapting to the changes caused by COVID-19 pandemic, individuals, sectors, and even businesses have resorted to maximizing the internet. However, cyberattacks have become an immediate challenge to organizations as we shift to digital processes. 

In fact, the Trend Micro Smart Protection Network (SPN) detected nearly 9 million Covid-19-related threats from January to June 2020 wherein 91% came from infected e-mails. 

In light of Cybersecurity Awareness Month, Eastern Communications, one of the premier telecommunications companies in the country, warns all sizes of enterprises to be on guard when it comes to their cybersecurity, especially now that digital platforms are being largely utilized.


Eastern Telecoms CyberSecurity
Eastern Telecoms explains cyberattacks happen anytime and disrupt business


Learning the possible cyberattacks 

According to Edsel Paglinawan, Eastern Communications Product and Innovations Head, some of the common cyberattacks that businesses may come across are Trojan, Phishing, Malware, Ransomware. While the most sophisticated is DDoS or Distributed Denial of Service Attack. 

Trojan is a type of malware that is often disguised as legitimate software, that can potentially delete crucial information and is capable of breaking security infrastructures. 

Another common cyberattack is phishing, an email-borne threat that usually tricks the recipient into downloading malware through a hyperlink which can potentially harm company and personal data. 

Malware, on the other hand, can take over a system or corrupt data. This can cause damage to a device or software and affect your business operations at a certain extent.  

Enterprises should also beware of Ransomware, an advanced threat that encrypts data and files on target systems, wherein hackers demand you to pay a ransom to regain access. 

A more sophisticated cyber threat is DDoS or Distributed Denial of Service Attack. This happens when Internet traffic is sent in an effort to flood a network’s infrastructure and/or exhaust a server’s resources. The result is that websites visitors’ requests cannot be fulfilled by the overwhelmed network or webserver.  


Securing the business before attacks occur

“Although the first four attacks mentioned are common and usually affect organizations on a small to medium scale, it’s imperative for enterprises to invest on cybersecurity solutions that have long-term benefits,” advised Paglinawan. 

Paglinawan also added that securing a network before any attack happens is worth the expenditure. It saves companies from unnecessary IT costs, so they could focus on other aspects of the business.

Enterprises may explore Eastern’s Endpoint Security, a centralized approach to protecting all endpoints – servers, desktops, laptops, smartphones, and other Internet of Things (IoT) devices – connected to the corporate IT network from cyber threats.

For a more sophisticated attack like DDoS, operations can be protected through Eastern Cyber Defense, a DDoS Protection Service that is either a Website Protection or a Network Infrastructure Protection, or a combination thereof. 

“Cyber criminals are getting more clever at this trying time, and businesses have to be one step ahead by knowing what their potential cyber enemies are, what these threats are capable of, and learning how to beat them from harming your assets,” Paglinawan added.

To learn more on securing your business from cyberthreats, visit eastern.com.ph.


Eli has 28 years of extensive IT sales expertise in Data, voice and network security and integrating them is his masterpiece. Photography and writing is his passion. Growing up as a kid, his father taught him to use the steel bodied Pentax and Hanimex 135mm film and single-direction flash, Polaroid cameras, and before going digital, he used mini DV tape with his Canon videocam. He now shoots with his Canon EOS 30D. Photography and blogging is a powerful mixture for him.
Back to top button