- Verizon 2018 Data Breach Investigations Report
Who's behind the breaches?
What tactics do they used?
What else is common?
of the breaches are from outsiders and involved organized criminal groups.
of hacking-related breaches leverage either stolen and/or weak passwords.
of malware was installed via malicious email attachment and were financially motivated
The vast majority of compromises are based on known problems that have known solutions. As defenders we have access to an extraordinary array of security tools and technology, security standards, training and classes, certification, vulnerability database, guidance, best practices and many more.
But all of this technology, information, and oversight has become veritable “Fog of more”: competing options, priorities, opinions and claims that can paralyze or distract enterprise from vital action. In this complex, interconnected world, no enterprise can think of its security as a standalone problem.
The CIS Controls are informed by actual attacks and effective defenses and reflect the combined knowledge of expert from every part of the ecosystem (company, government, and individuals) with every role who have banded together to create, adopt, and support the controls.
This ensures that the controls are the most effective and specific set of technical measures available to detect, prevent respond and mitigate damage from the most common to the most advanced of those attacks.
WINTTUX - IT Security & Consulting firm specializes in helping organizations to achieve security assurance by protecting, improving operational efficiency and developing advanced cybersecurity solutions.
Sign up for our weekly newsletter
© 2018 Winttux Solutions