Many sophisticated cyber-attacks have multiple stages. What many regular people don’t realize is that this is often also true for attacks targeting them. In this briefing, we will construct a hypothetical attack scenario. It is explicitly not recounting an actual attack (albeit it is quite likely that someone is executing [...]
Cyberattack trends show rapid growth in numbers and complexity yielding success in terms of the number of compromised systems. This makes it imperative that any individual capable of using information technology resources understands the value of those resources and keep them safe from abuse. A formal security training program, aside from being mandated by regulations and standards, is a must for any modern business.