Anatomy of an Attack

An interesting article recently appeared on informit.com.  It uses a fictional company as an example on how corporate information security defences can be breached.  The article, How to Steal 80,000 Identities in One Day, goes through the various stages of an attack, including reconnaissance, identifying the weakest link and exploiting it.  While it is a fictional account, it makes for interesting reading and one that should cause you to review your own security program and to see how best to improve it.  Our take from the article are as follows;

 

Why get in touch with BH Consulting

BH Consulting is a trusted, independent cybersecurity and data protection consultancy with over 20 years of experience. Whether you need expert guidance on compliance, risk management, or security strategy, our team delivers practical, vendor-neutral advice tailored to your needs.

Let’s start a conversation about securing your business.

ISO27001 certification europe logo
cyber ireland 2021 logo
Respect in Security Pledge logo

Areas of interest*