Cyber “Advanced Persistent Threats” Lurk Before Striking

By on July 17, 2019

July 17, 2019

Some of the most insidious and sophisticated cyber attacks against organizations take the form of “Advanced Persistent Threats.” The key to how APTs work is stealth. An initial breach may employ conventional hacking strategies, like phishing or other common methods for introducing malware. But then the attackers stay quiet for as long as possible, meanwhile stealing the maximum amount of information not only from the company, but likely from its clients, customers and suppliers as well. The key to defending against APTs is first to understand what they are and then to develop a tailored threat model that take into account the organization’s particular IT structure, data assets, and its employees and facilities.

Read the full article at:

LookingGlass Cyber Solutions

Leave a Reply

Your email address will not be published. Required fields are marked *

Do NOT follow this link or you will be banned from the site!