logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
9th November 2018 by CyberVision 0 Comments 947 Views
9th November 2018 by CyberVision in Business Security

How to detect a Targeted Cyber Attack

 

A targeted attack is any malicious attack that is targeted at a specific individual, company, system or software. Targeted cyber attacks are considered higher risk with higher rewards for attackers than the average random attack. Attackers’ main motivations are usually always financial, with the goal to steal information and extort money from the victims. All organisations should Your company should be ready for a targeted cyber attack and have set processes and protocols in place to best deal with the possibility of this occurring.

 

Detecting a targeted attack is difficult, especially because attackers have mastered the art of being almost invisible to avoid the repercussions, such as prosecution for their illegal actions. Attackers use tools that are familiar to your environment and they generally stay away from tactics that might cause suspicion.

 

It is advisable to implement monitoring systems that record all events that take place on a network. The information that has been collected in this way can then be used to investigate real threats. However, monitoring solutions typically capture millions of events per month which is far too many alerts for security teams to handle individually. Too many of these alerts also turn out to be false positives and all these false alarms end up detracting from the real incidents that actually matter.

 

So how does a company really detect a targeted attack? The answer is to use a detection and response solution that not only picks up suspicious events, but does the background work to investigate the context of the events using machine learning and behavioural analysis. Placing each event into the proper context, the automated system can filter out the false positives without the IT team wasting their valuable time.

 

With technology advancing at such a rapid rate, it’s great to know that detecting threats efficiently is possible with F-Secure, which uses their innovative technology in vulnerability solutions like their RADAR product to hone in on the incidents that matter.

 


0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • cyber attacks
  • Detect
  • f-secure
  • f-secure cyber security
  • targeted cyber attacks
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo