The Threat Connection
April 2018
Cybercriminals target organizations of all shapes and sizes. But we also must contend with insider threats, whether they be accidental or malicious. Ensuring that sensitive information stays safe throughout its lifecycle means assessing our vulnerabilities both internally and externally. In this month’s issue, we analyze the most common threats we face and demonstrate the most common solutions to preventing those threats from compromising our objectives as security aware organization.
- What does APT stand for? (Advance Persistent Threat)
- What type of phishing attacks target specific people and organizations? (Spear phishing)
- Hiring someone to break into networks and report vulnerabilities is known as what? (Penetration Testing)
- Anyone with inside access to our organization is considered to be this type of threat. (Insider)
- These types of attacks take down servers and networks by flooding them with more information than they can handle. (Distributed denial-of-service (or DDoS))