Cyber Attacks

"Everyone has a plan until they get punched in the face." - Mike Tyson Not an everyday occurrence, but certainly a reality experienced or heard of, and perhaps on-going within your organisation as you read this.

Cyber Attacks - What are they actually?

Something unexpected has happened, your IT team has advised of a systems’ hack

Your company’s website has been defaced – it had to be taken offline.  Your systems have been blocked from usage – a denial of service attack.  There has been a breach of your data server – client information has been stolen.  Not an everyday occurrence, but certainly a reality experienced or heard of, and perhaps on-going within your organisation as you read this.

Mainstream media is awash with news about households and corporations hit by online crime.  The headlines focus on big name corporations and financial costs in the millions.  Board directors and the senior leadership team are ultimately responsible for a company’s successes and failures.  They are faced with an array of business-critical topics requiring a course of action.  They expect to be fully briefed on complex matters and very basic questions will come raining down hard & fast.

“How good is our security?” or “Are we safe?”

You may well have to respond to these questions in your capacity as IT Manager or Practice Manager, so let us imagine being the object of a grilling by senior management when something unexpected happens.

The executive team needs to hear that threats evolve and grow.

The motivations of perpetrators stretch from enthusiast curiosity to economic gain, terrorism & warfare.  Pockets funding the industry of hacking an electronic system through the internet are deep.  The standard ‘kill-chain’ involves the target being surveyed for vulnerabilities, a foothold gained, a weakness exploited, the attack goal achieved.  It is therefore key to understand that defences from attack need to be layered and include a range of measures from technology solutions to user education.

Our Memo provides further insight.

Share:

Facebook
Twitter
Pinterest
LinkedIn

Leave a Reply

Your email address will not be published.

On Key

Related Posts

WEBSITE SECURITY REPORT

GOLD

Imagine you own a house and want to add an additional floor. First you have to review and strengthen the foundations. This service builds cybersecurity foundations to facilitate growth in a resilient, timely manner.

This service will also provide the company with a cybersecurity risk assessment and improvement plan but with significantly more support from a senior consultant to help the company embed improvements in a continuous, timely manner

SILVER

The dreaded car MOT is looming. It’s the unforeseen wear & tear that results in some necessary annual maintenance. Our cybersecurity review will highlight what needs to be done as your engineers.

In addition to the context gathering stage and security footprinting service, a senior consultant will perform a risk assessment to understand the company’s cyber risks and provide recommendations. They will also be available to undertake monthly calls for answering questions, providing guidance and checking on whether risks are reducing.

BRONZE

You’re embarking on a more active lifestyle, chosen to go on a diet and get in shape. Think of this service as the cybersecurity equivalent of the personal trainer, helping you along the way.

After an initial context gathering stage, a junior security consultant will be available once per month to answer questions and provide recommendations based on company goals and activities. A cybersecurity footprinting service will allow the company to continuously monitor its external security posture.

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.