• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
14240 Sullyfield Circle #K Chantilly, VA 20151
  • Client Login
  • Remote Support
  • Tools
  • Blog
  • Contact
  • (703) 204-2958
Taking Care of Your Business Site Logo

TCB Inc

Northern VA Managed IT Services Provider

  • (703) 204-2958
  • Request A Consultation
  • About
    • Careers
    • Client Support
    • New User Request
    • Partners
  • Compliance Audits
    • CMMC
    • FedRAMP
    • FISMA
    • NIST 800-171
    • NIST 800-53
    • OMB Circular A-130
  • IT Security
    • Cloud Security
    • Incident Response
    • Network Assessment
    • Network Monitoring
    • Penetration Testing
    • Risk Management
  • Managed IT
    • Data Backup & Disaster Recovery
    • Hosting
    • IT Assessments
    • IT Help Desk
    • Network Installation & Integration
    • Outsourced IT Support
    • Spam Filtering
  • IT Consulting
    • CTO Consulting
    • Cybersecurity Consulting
    • Database Consulting
    • Integration Consulting
    • Website Consulting
  • Resources
    • Careers
    • Client Login
    • Remote Support
    • Tools
  • About
  • Our Partners
  • Request A Consultation

How cyber criminals use brute force attacks

November 22, 2021 by jaypee

hacker

Some see them as the perfect present. More thoughtful than cash… less chance of getting the wrong thing.

Cyber criminals like a gift card too.

They’re using brute force attacks to target gift cards and steal them.

If you don’t know, a brute force attack is when they try thousands of passwords against your email address. They hope you use a weak password. Then, they can guess it by trying thousands of easy passwords.

This does work for them, because they mass test millions of username and password combinations against the world’s major email providers every day.

They’re smart, too. They avoid being caught by stealing small amounts regularly over long periods of time.

Brute force attacks aren’t just used for gift cards. They’re used to break into all systems and apps.

Your email is a favorite, as it’s the gateway to resetting passwords and getting access to dozens of systems.

The usual advice applies here:

  • Use a password manager
  • Always use different passwords across all of your online accounts
  • Use multi-factor authentication (where you generate a code on a separate device) or biometrics

If you need security help for your business, give us a call.

categories iconIT Security

Primary Sidebar

Get In Touch

Call us at 703-204-2958 or request a consultation, and we will respond to you in a timely manner.
  • This field is for validation purposes and should be left unchanged.

Footer

TCB, Inc.

14240 Sullyfield Circle #K Chantilly, VA 20151 (703) 204-2958
  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

Company

  • About
  • Blog
  • Client Support
  • Contact
  • New User Request
  • Partners

Resources

  • Careers
  • Client Login
  • Remote Support
  • Tools

Managed IT Services

  • Data Backup & Disaster Recovery
  • Network Installation & Integration
  • Hosting
  • IT Assessments
  • IT Help Desk Support
  • IT Security
  • Spam Filtering

© 2025 TCB, Inc. · Website Privacy Policy & Terms of Use