How do cyber threats arise?
Cyber threats have more varied origins than you would think, often stemming from inadvertent employees and partners as well as from external malevolence.
Driven by financial motivation, blackmail and revenge.
Seek to harm or otherwise expose organizations not aligned with their own beliefs.
Driven by financial gain, thriving on extortion, identity theft, and corporate espionage.
Publicize their hacks or stolen data, looking for recognition and ego-boosters.
Unsecured phones, tablets, and laptops get lost or stolen. Employees access sensitive resources from non-company owned networks.
To provision systems without having to deal with IT, employees use non-validated software solutions, provision unsecure accounts and grant access to sensitive data.
Partners, suppliers, clients
Oftentimes, little to no control can be exerted on third parties who need to be able to access and edit your confidential information.
From demo accounts to ports that should not be open, default configurations are an easy way into a system.
Where do cyber threats take place?
Data leaks and cyber fraud have numerous sources across all corners of the internet, from the Surface Web to the non-indexed Dark Web, right through to unsecured connected devices.
Clear and Deep Web
The Clear Web or Surface Web is the "regular" internet, the one Google indexes and that anyone can access through their browser. Data on the Deep Web is often ephemeral and cannot be indexed by conventional search engines but remains readily accessible. Most common threat sources on the Clear and Deep Web are forums/message boards, code sharing sites such as Github, or paste sites like Pastebin or Just Paste It.
The Dark Web is a portion of the internet that is intentionally inaccessible through standard web browsers. The Tor network, an anonymous network that can only be accessed with a Tor-compatible browser, is most widely known for illicit activities: stolen information is commonly traded via Tor Forums and in Tor Marketplaces.
Poorly protected NAS (Network Attached Storage) appliances and misconfigured database engines subject your data to leaks when used by employees, clients and partners to backup and store critical documents.
Domain Name Servers
Impersonation is a favorite approach for stealing information, and compromising DNS represents the most frequent origin of these threats. Threats originating from the DNS ecosystem often employ techniques such as phishing and typosquatting.
What sort of data could be exposed?
Most cyber threats start with a data leak. Your precious data could already be unprotected and ripe for exploitation, to gain insight over your company and its critical processes, or to gain access to your systems and premises.
- Logins & passwords
- Admin passwords
- Social security numbers
- API Keys & secret tokens
- Proposals & price quotes
- Customer lists
- Analytics & reports
- Non-Disclosure Agreements
- Legal strategies
- Patent filings
- Methods & processes
- Drug formulas, recipes
- Source code
- Data sets
- API keys & secret tokens
- Financials records
- Earnings reports
- Bank records
Personally Identifiable Information (PII)
- Customer lists
- Employee lists
- Social security numbers
- Medical records
- Credit card lists
- SEPA or ACH payments
- Wire transfers
Cyber threats present a real risk to your business
Leaked data, passwords, source code or blueprints can be exposed to public scrutiny or used to prepare a sophisticated attack against your company or your customers.
Construction blueprints can be used to bypass security systems. A simple travel itinerary can be used to prepare a kidnapping.
Intellectual Property leaks
Product prototypes can be passed on to the press. A secret formula can be made public.
A PII leak can trigger a GDPR compliance violation. Legal strategy can be communicated to the opposing party.
Proof of bribes can be released to the press. Tax optimization schemes can be publicized.
Fraud and impersonation
Stolen credentials can be used to gain access to sensitive systems. Money can be transferred abroad through CFO impersonation.
SCADA systems can be shut down with stolen credentials. ERP data integrity can be compromised.
Stolen designs can be sold to a competitor. Confidential contract terms can be used to sway a negotiation.