How Cyber-Attacks Start (Part 1)
There are many types of cyber-attacks used by criminals today. Financial institutions should employ a layered approach to defending against these...
In Part 1 of this series we started to look at some of the tactics that attackers use to initially gain access to systems in your institution. The attack tactics are based on the MITRE ATT&CK Framework, which is used by many security professionals to help identify tactics and techniques used in cyber-attacks. In this article we will look at the remaining techniques, along with controls you should consider to mitigate these attacks:
If you want to dig deeper into creating a security program that protects against all of the different tactics used by attackers, email us at support@bedelsecurity.com to get the conversation started.
There are many types of cyber-attacks used by criminals today. Financial institutions should employ a layered approach to defending against these...
Everyone is on high alert right now because of Russian ransomware attacks as a part of the conflict in Ukraine.
Most financial institutions understand the importance of Multifactor Authentication (MFA) in keeping unauthorized parties from gaining access to user...