Cyber-attacks affect companies all over the world. Some attacks are relatively indiscriminate, such as the WannaCry ransomware attacks that swept the globe. Others are highly targeted acts of theft or espionage.
But all cyber-attacks are a potential threat to the operations, reputation, and integrity of organisations.
It is how you protect your business network and data that can make all the difference. These attacks are also becoming more and more frequent. Click here to view article about 400 Australian companies caught up in Cyber attacks.
Below is how these cyber-attacks are categorised;
Insider threats are defined as individuals trusted by an organization (such as an employee) who either on their own, or as part of a group, intentionally compromises the organization(s) that trusts them.
In most of the insider threat cases, insiders stole information (such as customer data or intellectual property) or conducted acts of industrial sabotage.
Internet exploits are attacks against a company’s internet-facing infrastructure.
These attacks involved a few different techniques, with the most common being an exploit against an unpatched vulnerability.
These were particularly prominent in the weeks following the disclosure of a vulnerability / exploit in a popular piece of server-side software.
Phishing/spear-phishing and emails with malicious attachments were the next most common attacks seen in the data.
Both types of attacks arrive in workers inboxes (phishing can also use messaging services or other platforms, but email is the most frequently used).
It’s important for organisations to be aware of this email’s widespread use.
TCT has developed a Cyber 360 portfolio to help businesses protect their networks and their data.
Talk to us today to build a cyber-attack resilience business.
Follow us on LinkedIn: