Advance Security: When Walls Are Penetrable

While many SecOps professionals focus on keeping cyberthreats at bay with breach-prevention, threats to security are constantly evolving around us. Nearly 80% of organisations reported data breaches in 2016, with a third of those reporting more than six breaches. Of that same group, less thanone-third anticipated an attack. This optimism – does not reflect the facts. More and more, attackers are using new tactics to circumvent pre-breach security measures. In fact, one report found that 60% of attacks – did not use malware at all. They now exploit a combination of weaknesses to infiltrate and hide inside operating systems striking from within. And – it is working: the average attack in 2016 gave hackers 146 days to act within victims’ systems.

In this five-section course, – we will look at what else can be done to stay in front of the evolving threat landscape.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Resource Details

Microsoft Corporation logo
Provided by:
Microsoft Corporation
Topic:
Security
Format:
HTML