Security News

Form Strategies Based on these Targeted Attack Stages

May 24, 2012

Connecting the APT Dots Download the infographic: Connecting the APT Dots

The term targeted attack has become a buzz term in the security industry. Its growing popularity is due to a steady stream of reported incidents.

We often hear about the stuff popular targeted attacks are made of—which new large company was breached this time, how problematic it is to change passwords after a major attack on a favorite mobile app, or who are axing their executives after a breach led to major trading lows. But really, what happens when companies are targeted? How do those attackers stick their foot inside the door and stay inside without anyone noticing? Are there invisibility cloaks against security staff?

There’s really no magic or mystery to it. Attackers follow six well-planned stages in going about stealing from a company.

It can start with a simple Facebook post with too much information in it, an email that supposedly came from a colleague, or a storage device an employee luckily found lying around on the way to the office. It all starts with a trigger, and from there, things can only go bad.

Ultimately, attackers will steal what information they can grab and leave companies with major headaches on how to deal with the consequences. However, that doesn’t mean that only targeted attacks cause data breaches or that money is the only reason for stealing company data.

Check which attack information you think you know is accurate and which ones are just myths.

Connecting the APT Dots

Like it? Add this infographic to your site:
1. Click on the box below.   2. Press Ctrl+A to select all.   3. Press Ctrl+C to copy.   4. Paste the code into your page (Ctrl+V).

Image will appear the same size as you see above.

Connect with us on