Five Years of Cyberattacks Against 14 Countries: Operation Shady RAT - HotHardware
This is an interesting read in security related issues. Most people know now that many organizations from everywhere it seems have been collecting information on you. Now just imagine some one or group took those separate pieces of information and put them together.
Think about it. There is no undo button. More than likely someone had or could put together all the information they needed to target you or steal from you.
In their research (click on article link above), McAfee gained access to one specific Command & Control server used by the hackers, and examined logs from the system. It determined that the hackers infected computers by first sending targeted emails to individuals in the companies or organizations. Once again, the weak link in security were human beings.
You do not have to be a security expert to understand that we ourselves (human beings) are the root of our own problems. Cyber Security Auditors & Administrators (CSA2) have strategic partnerships with industry experts to help organizations of all sizes create Written Information Security Plans (WISP). These plans are not only required, but they give you a defensible position to help with the government regulators.
Plan ahead, be prepared. Contact Dolvin today to find your solution.
No comments:
Post a Comment