How Cyber-Attacks Start (Part 1)
There are many types of cyber-attacks used by criminals today. Financial institutions should employ a layered approach to defending against these...
In Part 1 of this series we started to look at some of the tactics that attackers use to initially gain access to systems in your institution. The attack tactics are based on the MITRE ATT&CK Framework, which is used by many security professionals to help identify tactics and techniques used in cyber-attacks. In this article we will look at the remaining techniques, along with controls you should consider to mitigate these attacks:
If you want to dig deeper into creating a security program that protects against all of the different tactics used by attackers, email us at support@bedelsecurity.com to get the conversation started.
There are many types of cyber-attacks used by criminals today. Financial institutions should employ a layered approach to defending against these...
Since 2014, the Emotet Banking Trojan has been making headlines because of its ability to keep evolving and being used in more sophisticated attacks....