ERRARE HUMANUM EST, PERSEVERARE AUTEM DIABOLICUM
Human errors are all those actions or omissions (even unintentional), carried out by a user, that spread and / or allow a breach of information security to occur.
Credential theft is a threat that occurs when the malicious actor steals a user’s credentials to access certain restricted areas.
PREVENT, DON’T RISK
Power outages and/or voltage drops can compromise the business continuity of the infrastructure by impacting the availability of information.
SOLVE DEVICE INEFFICIENCY
Poor system configuration is a non-malicious threat and is the most widespread vulnerability globally.
DON’T TAKE THE BAIT
“Phishing” is a particular type of scam carried out on the internet through the deception and deception of users.
This threat takes the form of misleading messages and relies more on the characteristics of the victim than on the tool used by the victim.
FIND OUT WHAT “MALICIOUS CRYPTOMINIG” MEANS
Cryptojacking is a cybercrime consisting in secretly exploiting the computing power of the victim’s devices to generate cryptocurrency for the benefit of cybercriminals.
This is done by means of cryptojacking malware that work with background processes, subtracting hardware resources to the detriment of the user.
FIND OUT HOW USEFUL INFORMATIONS ARE COLLECTED
Social engineering is a technique that exploits the implicit characteristics of human beings (e.g. moods) with the aim of pushing people to reveal certain information.
HOW TO DEFEND YOURSELF?
Ransomware is a malware threat that can infect a device, blocking access to all or some of its contents (photos, videos, files, etc.) and then asking for a ransom to be paid to restore the availability of the same.
HOW MINIMIZE RISKS
DDoS attacks are types of threats that target process availability by depleting resources, causing performance drops, data loss, and service disruptions.
MAKE SURE THE INFORMATION IS RELIABLE
Disinformation is a type of intentional attack that aims to create and share false and/or misleading information to manipulate public opinion.
FIND OUT HOW TO PREVENT COORDINATED ATTACKS
The attack on the Supply Chain (or third-party attack) is a threat that targets suppliers instead of directly attacking specific companies.
This makes identification and protection more difficult, especially when suppliers do not adhere to strict IT security criteria.
LET’S NOT BE CAUGHT UNPREPARED
Natural disasters are threats that generate the total or partial unavailability of systems.
HOW TO DEAL WITH THIS NEW THREAT
Thermal attacks consist in the use of thermal cameras to detect the points of contact of man with the surface.
HOW CRIMINALS GET INTO OUR HOMES (OR RATHER OUR PCs)
Spyware is malware that secretly records user behavior on devices, so that attackers can use this information.
Contact us to receive the printed version of our training table!