Source |
Network World |
Identifiant |
302098 |
Date de publication |
2017-01-30 04:00:00 (vue: 2017-01-30 04:00:00) |
Titre |
IDG Contributor Network: 6 ways to launch a targeted cyberattack |
Texte |
The threat of a targeted attack for any business is real and substantial. It's vital to ensure that your organization can identify constantly evolving threats, find abnormal and suspicious activity, and take effective action to keep your data safe.
Consider that, on average, attackers are in a network for more than 140 days before they're detected, and 60% of network intrusions are eventually traced back to credentials, according to according to Microsoft.
Most successful targeted attacks follow six steps or stages, though it's important to remember that these steps often run in parallel. Multifaceted attacks are common, so a robust threat response plan should address all six steps and avoid jumping to conclusions.To read this article in full or to leave a comment, please click here |
Envoyé |
Oui |
Condensat |
140 abnormal according action activity address all any are article attack attackers attacks average avoid back before business can click comment common conclusions consider constantly contributor credentials cyberattack data days detected effective ensure eventually evolving find follow full here identify idg important intrusions jumping keep launch leave microsoft more most multifaceted network network: often organization parallel plan please read real remember response robust run safe should six stages steps substantial successful suspicious take targeted than these they though threat threats traced vital ways your |
Tags |
|
Stories |
|
Notes |
|
Move |
|