HAVE YOU EVER BEEN HACKED?

HAVE YOU EVER BEEN HACKED? 90% of companies have been hacked 70% of attacks go undetected 60% of all small/med size businesses go out of business ...
Author: Delphia Palmer
2 downloads 1 Views 38KB Size
HAVE YOU EVER BEEN HACKED?

90% of companies have been hacked

70% of attacks go undetected

60% of all small/med size businesses go out of business within 6 months of a data security breach

32% of computers around the world are infected with viruses and malware

HOW WOULD YOU KNOW?

CYBERASSIST IS HOW YOU KNOW

205

days

on average before an attack is detected

Prevent

Protect

The Federal Bureau of Investigation reports an

Threat actors only have to get it right once!

average of $560 million in personal losses,

Prevention can only take you so far. We can provide

while McAfee reports an average of $1 trillion

the tools needed to harden your network using

in business losses per year.

a layered, defense-in-depth strategy.

Preventative services include:

Protection Solutions & Services include:

• Risk Assessments

• Firewall and Perimeter Security Appliances

• Vulnerability Assessments

• Signature, Behavioral and Anomaly-Based Intrusion

• Penetration Testing

• Detection and Prevention Based Anti-Virus/Anti-Malware

• Policy and Procedures Drafting and Review

• Network Encryption (Data in Transit)

• Security Awareness Training

• Server Encryption (Data at Rest)

Monitor

Respond

Our CyberAssist program not only provides you

No network, no matter how robust the security, is

with the tools needed to secure your environment,

ever 100% secure. CyberAssist’s response packages

we take it one step further by providing the resources

provide you with efficient response and remediation

needed to actively monitor the performance and

capabilities.

security of your network.

Response services include:

Monitoring services include:

• 24/7 Incident Response Teams

• Secure Cloud Monitoring Service which also allows

• Comprehensive Incident/Breach Response

for Cloud Storage of Monitoring Logs • Behavioral Intelligence & Anomaly Detection • 24/7 Monitoring and Notification Support

Procedures • Incident/Breach Response Training for your internal team

• Security Event Analysis

• Response Analysis and Reporting

• Network Performance Analysis

• Remediation Support and Preventative Analysis

CYBERASSIST

Security Platform as a Service

CYBERASSIST

Glossary

./ . " " $  + An Internet borne attack usually perpetrated by a group of individuals with

master boot record (MBR): Information contained in the first sector of a storage device that identifies how and where

significant resources, such as organized crime or a rogue nation state.

an operating system is located so that it can be loaded into memory.

.               

      A firewall beyond traditional port based controls that enforces policy based on application, user, and content regardless of port or protocol.

0 .  Malware that enables an attacker to bypass normal authentication to gain access to a compromised system.   A security scanner used to discover network hosts and services. 1 +           "         original distributor incurring the costs of hardware, hosting, and bandwidth resources.

     An API for capturing network packets.

0   A kernel mode variant of a rootkit, commonly used to attack computers that are protected by full disk encryption.

  !"      ! A proprietary Microsoft protocol that provides remote access to a computer.

bot:      "   "   # ' "

              

botnet: A broad network of bots working together.

# #$ ##% A set of standards and an associated network protocol that establishes a secure channel between         

Box: A SaaS based online storage application that employs SSL encryption. It’s frequently used by corporate organizations so that users can upload, download, and share files publicly and privately.

# # " & ' ##& A transport layer protocol that provides session based encryption and authentication for secure communication between clients and servers.

. " 0. .  "/  !! # A large scale attack that typically uses bots in a botnet to crash a targeted network or server.

#  *  + "      #*+ An Internet standard for email transmission that uses TCP port 25.

.'   !# !!#*  +     389    #  

"  $ "$  A targeted phishing attempt that seems more credible to its victims and thus has a higher probability of success. For example, a spear phishing email may spoof an organization or individual that the recipient actually knows.

2  ' $  2 An application layer protocol that facilitates near real time communication in a client server networking model.

+ " ""         + A connection oriented protocol responsible for establishing a connection between two hosts and guaranteeing the delivery of data and packets in the correct order.

2" An open standard protocol used for secure VPN communications over public IP based networks. + ,  $ " A program designed to breach the security of a computer system while ostensibly performing some    0 0 A set of instructions secretly incorporated into a program so that if a particular condition is satisfied,

innocuous function.

the instructions will be carried out, usually with harmful effects. -" !        -! A connectionless oriented protocol often used for time sensitive, low latency    Malicious software or code that typically damages or disables, takes control of, or steals information from a computer system. Broadly includes viruses, worms, Trojan horses, logic bombs, rootkits, bootkits, backdoors, spyware, and adware.

communications that don’t require guaranteed delivery.

CYBERASSIST

Security Platform as a Service

www.bluestarcs.com | 1-800-471-8571