Shutting the Door on Data Theft - Upcoming Webinar
A while back it seemed like you just had to worry about foreign governments or competitors going after your IP, and cybercriminals stealing your money. As if that weren’t bad enough, now all of a sudden it’s cool to be a hacker again? Media notoriety elevates the atmosphere around the black, white, and grey hat communities.
So now, hordes of pro and semi-pros are armed with the same arsenal of tools and exploits. I’ve heard that breaches run in the hundreds of dollars per record, but if it is your IP stolen – the fundamental ingredients that make your business what it is, the pain can be even greater.
So, how do they do it? These bad guys are creating code that knows where your weaknesses are and searches out your most valuable data. They use combinations of email and web tactics, gain a foothold in your system and then have almost free reign to exfiltrate any data they think they can monetize.
How easy is it to evade detection? Well , John Strand just posted an excellent article about how to bypass AV on Pauldotcom. I think it’s almost recommended reading for anyone protecting a network.
In addition – tomorrow I’m going to be hosting a Webinar on some of our research on attacks, attack types and how you can stay ahead in the game. It’s a dog eat dog world out there, and there is a lot at stake. Join me and we’ll talk it through. You can register for the webinar here:https://connect.websense.com/e15206815/event/event_info.html
I look forward to sharing with you.