|
Post by account_disabled on Nov 25, 2023 10:28:48 GMT
Third-party attacks - involving the use of suppliers' or contractors' infrastructure to break the corporate security of large companies. They may involve, for example, infecting servers containing updates to software used by other companies (this happened, among others, during the attack on SolarWinds or the global attack using the NotPetya worm) or infecting company. Systems with malware previously introduced into devices used by service technicians. Risk Management Monitor estimates that only 52 percent companies have safety standards for external contractors C Level Contact List and subcontractors. Dangers related to communication on the Internet Still one of the biggest online threats is the so-called phishing, phishing for information via counterfeit messages. Instant messages or text messages. Here, too, the rapid development of remote work is behind the rapid increase in risk. Employees who use mainly e-mails or instant messengers for internal communication are more vulnerable to attacks using increasingly sophisticated, fraudulent messages. The result of a phishing attack may be extorting passwords to the company.
|
|