swimming with sharks - sumnerone pdf...swimming with sharks presents phishing protection: don’t...

1
Learn how to navigate the dangerous waters of cyberattacks. SWIMMING WITH SHARKS PRESENTS PHISHING Protection: Don’t open suspicious attachments or email. AKA Spoofing Hackers will imitate a legitimate website or email to trick users. MAN IN THE MIDDLE DENIAL OF SERVICE Protection: Equip users with the latest operating systems and patches. A NOTE ABOUT MALWARE: malware is software designed to gain unauthorized access to a computer and can accompany any other cyberattack. AKA Session hijacking an attacker interrupts the small transactions a computer has with a remote web server in order to gain information. AKA Distributed Denial of Service (DDOS) attackers flood a website with enough traffic to shut it down. SQL INJECTION ZERO-DAY EXPLOIT Protection: Warn users not to click on comments in blogs, websites, social media, etc. Protection: Keep software up to date. Install routine patches, anti-virus, and anti-malware software. AKA Cross-Site Scripting (XSS) — an attacker targets a vulnerable website in order to steal stored data, usually financial or personal. AKA Zero-Day vulnerability - attackers find weaknesses or security holes in a system or a single computer, they then install malware, steal data, etc. Protection: Create and implement security-related policies and procedures and make sure they’re enforced. Conduct penetration testing. almost 50% of businesses have already experienced a cyberattack 1 . Of that 50%, almost 1 in 4 suffered significant damage or loss to their own or public data 2 . The IT landscape may be a rough sea full of black hat pirates, but fortunately stronger sailors are made through awareness and education. Sadly , https://www.mckinsey.com/business-functions/mckinsey-digital/our-insights/ten-trends-shaping-the-internet-of-things-business-landscape https://www.mckinsey.com/business-functions/mckinsey-digital/our-insights/ten-trends-shaping-the-internet-of-things-business-landscape 1 2 Check out some tips for smooth sailing at sumnerone.com

Upload: others

Post on 29-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SWIMMING WITH SHARKS - SumnerOne PDF...SWIMMING WITH SHARKS PRESENTS PHISHING Protection: Don’t open suspicious attachments or email. AKA Spoofing Hackers will imitate a legitimate

Learn how to navigate the dangerous waters of cyberattacks.

S W I M M I N G W I T H S H A R K SPRESENTS

PHISHING

Protection: Don’t open suspicious attachments or email.

AKA Spoofing

Hackers will imitate a legitimate website oremail to trick users.

MAN IN THE MIDDLE

DENIAL OF SERVICE

Protection: Equip users with the latestoperating systems and patches.

A NOTE ABOUT MALWARE:malware is software designedto gain unauthorized access toa computer and can accompanyany other cyberattack.

AKA Session hijacking — an attacker interrupts the small transactions a computer has with a remote web server in order to gain information.

AKA Distributed Denial of Service (DDOS) — attackers flood a website with enough traffic to shut it down.

SQL INJECTION

ZERO-DAY EXPLOIT

Protection: Warn users not to click on commentsin blogs, websites, social media, etc.

Protection: Keep software up to date.Install routine patches, anti-virus, andanti-malware software.

AKA Cross-Site Scripting (XSS) — an attacker targets a vulnerable website in order to steal stored data, usually financial or personal.

AKA Zero-Day vulnerability - attackers find weaknesses or security holes in a system or a single computer, they then install malware, steal data, etc.

Protection: Create and implement security-related policies and procedures and make sure they’re enforced. Conduct penetration testing.

almost 50% of businesses have already experienced a cyberattack1. Of that 50%, almost 1 in 4 suffered significant damage or loss to their own or public data2. The IT landscape may be a rough sea full of black hat pirates, but fortunately stronger sailors are made through awareness and education.

S a d l y ,

https://www.mckinsey.com/business-functions/mckinsey-digital/our-insights/ten-trends-shaping-the-internet-of-things-business-landscapehttps://www.mckinsey.com/business-functions/mckinsey-digital/our-insights/ten-trends-shaping-the-internet-of-things-business-landscape

1

2

Check out some tips for smooth sailing at sumnerone.com