Dear Modern Business: Sincerely Future Hackers
In Mimecast’s SlideShare presentation, we want to share with you a view from a hacker into the modern day cadence, and help you understand how their minds work so you can be prepared for any issue that may arise. Look to our inside expert, Bob Adams, as he shares a closer eye on five things a hacker would tell a modern day business. Listen up!!!
Hacker Insider-Moment One: Yesterday’s security controls won’t cut it in the future.
What you have today for technology might stop some attacks…but what about the more sophisticated and targeted attacks? How will it do in the future?
Hacker Insider-Moment Two: Patch releases tells me where you're likely vulnerable.
Very few organizations patch their systems in a timely manner. I don’t need a zero-day when exploiting a known vulnerability will work.
Hacker Insider-Moment Three: Social Media should be handled with care.
This gives us insight into your business- your terminology - your hierarchy - speech patterns through quoted executives - business relationships. Overall, employee interests and relationships are easily found and can be exploited instantly.
Example: Fan of a sports team or part of a professional organization? We can get at you by sending an email from a sneaky email domain that contains malicious content intermingled with a trust enhancing subject matter.
Hacker Insider-Moment Four: Don’t be Naive, there are bad people out there. And I'm interested in you!
Many people think they aren’t a target because what would any attacker want with them? Do you have money, customer data, partners, competitors? These are all things I would want to exploit and take from you. You don’t know what I'm looking for. I'm a hacker, it could be anything.
Hacker Insider-Moment Five: I'm not who you think I am.
Cybercrime has become an organized, often profit seeking business. I'm not the person hiding behind a screen or living in my parent’s basement. Now, you have a bigger risk! More commonly, hackers are part of an international group, a place where we pool and share data across a variety of online networks. Whether it's state sponsored or a cybercriminal group, we’re more organized and efficient than you're led to believe.
Love to Learn AboutCyber Resilience for Email?
Get all the latest news, tips and articles delivered right to your inbox
You will receive an email shortly