Take the right approach to data hijacking – help secure the net



Cybercriminals are often experts. An extortion attempt usually begins with an individual or a group selecting a target in one of two ways: either they receive a request from an extortionist or they find their own prey to sell access.

Attackers pick victims who have a good chance of paying and unfortunately they buy products to keep the bad guys out.

Help in this video for Net Security, Dennis Underwood, CEO Cyber ​​CrucibleDiscusses why we are taking the wrong approach to data snatching and how to get the right one.


Source link