90 likes | 100 Views
Having a trained and engaged team, coupled with effective and current cyber security practices will take your business a long way towards keeping your systems and data secured. But just like any security method, they are generally reactive and will be developed in response to a successful attack. Malicious actors are always developing new ways to get around our defences and they only have to be successful once. New types of attacks and vulnerabilities are sometimes found only when they are successfully exploited, which means that someone must be on the receiving end of an attack.<br>
E N D
Detecting a Detecting a breach and breach and immediate immediate action action
Cybersecurity article series: Cybersecurity article series: ● Cybersecurity risk analysis ● Staff training ● Detecting a breach and immediate action ● Recovering from a breach
ABOUT Detecting a breach ABOUT Detecting a breach Having a trained and engaged team, coupled with effective and current cyber security practices will take your business a long way towards keeping your systems and data secured. But just like any security method, they are generally reactive and will be developed in response to a successful attack. Malicious actors are always developing new ways to get around our defences and they only have to be successful once. New types of attacks and vulnerabilities are sometimes found only when they are successfully exploited, which means that someone must be on the receiving end of an attack.
Some common Some common indicators of an indicators of an attack include attack include
● Unusually high system or disk activity while applications are idle Activity on unusual network ports or listening to unusual ports Presence of unexpected software or system processes Configuration changes that were not approved or cannot be traced to approvals Unexpected firewall changes Anomalous user activity – logging in at unusual times, from unusual locations or from multiple locations within a short time period ● ● ● ● ●
● Unexpected user account lockouts or password changes Repeated system or application crashes Disabling of antivirus or malware protection services Abnormal behaviour during web browsing – repeated popups, unexpected redirects or changes to browser configuration Reports of unusual messages claiming to come from your email server or social networks. A direct message from an attacker. ● ● ● ● ●
Important rules to note and actions Important rules to note and actions that should be taken that should be taken change the SSID Log everything isolate compromised devices
LOCATIONS LOCATIONS POSTAL ADDRESS SILO Compliance Ltd. PO Box 10297 APO George Town, Grand Cayman Cayman Islands PHYSICAL ADDRESS SILO Compliance Ltd. 261 Whirlwind Drive George Town, Grand Cayman Cayman Islands Main Telephone: +345-945-3354
THANKS THANKS Do you have any questions? info@silocompliance.com +1 501-422-8030 www.silocompliance.com CREDITS: This presentation template was created by Slidesgo, including icons by Flaticon and infographics & images by Freepik