Your browser does not support viewing this document. Click here to download the document.
|
Cyber Security Threats
Cyber security Threats are constantly advancing and becoming close to impossible to detect. Some cyber threats can be easily prevented by educating each other, while some are difficult to avoid. Phishing and password attacks are cyber threats that can be easily prevented by educating one another to use best practices. Best practices include:
Advanced cyber threats can destroy an organization by ruining its reputation or financially draining it. Examples of these advanced cyber threats are denial of service and malware. Denial of Service (DoS) is a cyber attack not intended for financial gain but instead to have the organization lose money and reputation due to their services being down. A well-known strategy to complete this attack is to overwhelm their server, causing it to crash or temporarily halt. Malware comes in various types and can be introduced to the system unintentionally or intentionally. Ransomware is a common malware that demands the victim to pay a “ransom,” or their files will be destroyed, encrypted, or exposed. Unintentionally this ransomware can be downloaded by clicking on a malicious file or link by a phishing email. Intentionally this can be installed by an insider threat. |
Your browser does not support viewing this document. Click here to download the document.
|
Incident Response
No organization is immune to cyber threats. Creating an in-depth Incident Response Plan (IRP) can mean the difference between being shut down for months or operating within days. Before preparing the plan, we identify key incident response team members. The team member can be anyone the organization deems necessary to respond to the incident. Incident Response comes in 6 steps:
|