Cyber “Advanced Persistent Threats” Lurk Before Striking
July 17, 2019
Some of the most insidious and sophisticated cyber attacks against organizations take the form of “Advanced Persistent Threats.” The key to how APTs work is stealth. An initial breach may employ conventional hacking strategies, like phishing or other common methods for introducing malware. But then the attackers stay quiet for as long as possible, meanwhile stealing the maximum amount of information not only from the company, but likely from its clients, customers and suppliers as well. The key to defending against APTs is first to understand what they are and then to develop a tailored threat model that take into account the organization’s particular IT structure, data assets, and its employees and facilities.
Read full article at:
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.