In a network attack, attackers are focused on penetrating the corporate network perimeter and gaining access to internal systems. The attacker may be using a variety of attack techniques to breach the perimeter. The attacker may attempt to exploit a vulnerability in the corporate network and obtain a network foothold. The attacker may also use other techniques such as phishing, spear phishing and social engineering to gain access to company networks, so make sure you give this a read to start learning how you can protect your yourself and your company from this attack.
What can be done to minimize the impact of network attacks?
Mitigation measures that may be necessary to secure a company’s networks include network-wide, local and network-extended mitigations, including firewall and antivirus controls; firewall and antivirus software; software controls for employee access; and firewall and antivirus software that monitors network traffic. If a breach does occur, should we immediately notify the company’s management or wait? The primary consideration in assessing the impact of a breach is whether the breach was severe and how quickly it occurred. As stated earlier, many breaches are not detected immediately. However, a quick notification to the appropriate party is always prudent. What actions should we take if our data were accessed or disclosed? At this time, we are unable to discuss details of this matter, including how your personal data may have been accessed. But, we take very seriously any data breach and we have taken a number of steps to increase security, protect our customers and improve the privacy of our customers. The first step to ensure that your personal information remains secure is to implement appropriate security measures in order to protect your personal information against all risks, including theft, loss, misuse, unauthorized access, disclosure, alteration, and use.”