1 / 9

Detecting a breach and immediate action

Having a trained and engaged team, coupled with effective and current cyber security practices will take your business a long way towards keeping your systems and data secured. But just like any security method, they are generally reactive and will be developed in response to a successful attack. Malicious actors are always developing new ways to get around our defences and they only have to be successful once. New types of attacks and vulnerabilities are sometimes found only when they are successfully exploited, which means that someone must be on the receiving end of an attack.<br>

Télécharger la présentation

Detecting a breach and immediate action

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Detecting a Detecting a breach and breach and immediate immediate action action

  2. Cybersecurity article series: Cybersecurity article series: ● Cybersecurity risk analysis ● Staff training ● Detecting a breach and immediate action ● Recovering from a breach

  3. ABOUT Detecting a breach ABOUT Detecting a breach Having a trained and engaged team, coupled with effective and current cyber security practices will take your business a long way towards keeping your systems and data secured. But just like any security method, they are generally reactive and will be developed in response to a successful attack. Malicious actors are always developing new ways to get around our defences and they only have to be successful once. New types of attacks and vulnerabilities are sometimes found only when they are successfully exploited, which means that someone must be on the receiving end of an attack.

  4. Some common Some common indicators of an indicators of an attack include attack include

  5. Unusually high system or disk activity while applications are idle Activity on unusual network ports or listening to unusual ports Presence of unexpected software or system processes Configuration changes that were not approved or cannot be traced to approvals Unexpected firewall changes Anomalous user activity – logging in at unusual times, from unusual locations or from multiple locations within a short time period ● ● ● ● ●

  6. Unexpected user account lockouts or password changes Repeated system or application crashes Disabling of antivirus or malware protection services Abnormal behaviour during web browsing – repeated popups, unexpected redirects or changes to browser configuration Reports of unusual messages claiming to come from your email server or social networks. A direct message from an attacker. ● ● ● ● ●

  7. Important rules to note and actions Important rules to note and actions that should be taken that should be taken change the SSID Log everything isolate compromised devices

  8. LOCATIONS LOCATIONS POSTAL ADDRESS SILO Compliance Ltd. PO Box 10297 APO George Town, Grand Cayman Cayman Islands PHYSICAL ADDRESS SILO Compliance Ltd. 261 Whirlwind Drive George Town, Grand Cayman Cayman Islands Main Telephone: +345-945-3354

  9. THANKS THANKS Do you have any questions? info@silocompliance.com +1 501-422-8030 www.silocompliance.com CREDITS: This presentation template was created by Slidesgo, including icons by Flaticon and infographics & images by Freepik

More Related