Compliance » Cyber “Advanced Persistent Threats” Lurk Before Striking

Cyber “Advanced Persistent Threats” Lurk Before Striking

July 17, 2019

Vector Illustration "Snake Ornament"

Some of the most insidious and sophisticated cyber attacks against organizations take the form of “Advanced Persistent Threats.” The key to how APTs work is stealth. An initial breach may employ conventional hacking strategies, like phishing or other common methods for introducing malware. But then the attackers stay quiet for as long as possible, meanwhile stealing the maximum amount of information not only from the company, but likely from its clients, customers and suppliers as well. The key to defending against APTs is first to understand what they are and then to develop a tailored threat model that take into account the organization’s particular IT structure, data assets, and its employees and facilities.

Read full article at:

Get our free daily newsletter

Subscribe for the latest news and business legal developments.

Scroll to Top