- September 11th 2019 – Left of Boom – Understanding Your Digital Footprint
- August 20th 2019 – THREAT HUNTING WORKSHOPS with Fidelis Cybersecurity
- June 17th 2019 – Virtru and IT2Trust sign Nordic distribution agreement
- May 24th 2019 – Live Demo – Discover the Advantages of Acronis 12.5 Backup
- April 25th 2019 – How to transform your network operations with Flow Data
- April 2nd 2019 – Please welcome two new sales people at IT2Trust
- March 29th 2019 – Webinar: How to detect and stop CRYPTOMINING on your network
- March 8th 2019 – Get your own free internal WhatsUp Gold network monitoring
- February 20th 2019 – Please welcome new Inside Sales Specialist at IT2Trust
- February 5th 2019 – IT2Trust sign Nordic agreement with CensorNet
LEFT OF BOOM – UNDERSTANDING YOUR DIGITAL FOOTPRINT
When investigating cyber-attacks in an organization, the starting point for the investigation is typically the moment of infection, the “boom.” The investigation moves to the “right” by considering everything that happened after that initial “boom” and how to respond. The goal is to find how the attacker got in and what the attacker did while inside.
The process for advance attacks, however, includes a lot of research before the actual infection attempts. From the attackers’ view, the reconnaissance phase is usually the most important one. It is done by collecting preliminary information, constructing attack scenarios, using social engineering, studying the opponent’s network topology as much as possible and defining the attack goals.
In this blog we will discuss the left side of the attack timeline, what happens “left of boom” – before the infection. We will cover the recon phase of attackers and how we sometimes provide information to the attacker without knowing. We’ll discuss what a corporate digital footprint is, how to find out what our footprint is, and how to use it to our advantage.
You can also get news about IT-security sent directly to your inbox – via our e-newsletter News2You.
News2You is targeted to both resellers and end users – and contains the latest within IT-security and Networking solutions – as well as invitations to seminars and other events we host.
Do you wish to receive News2You in the future, please send os an e-mail to firstname.lastname@example.org