Targeted attacks and how to defend against them
Premium Content

Access "Targeted attacks and how to defend against them"

Targeted-attacks-and-how-to-defend-against-them-(1376663417_983).jpg

Sponsored by ComputerWeekly.com

For years businesses have striven to keep malware, spam and unwanted intruders at bay with varying degrees of success. Much of the protection they have put in place assumes that most of these attacks will be random and that, if an organisation’s defences are too hard to breach, the attacker will seek an easier victim. That situation is changing fast with the rise of targeted attacks (or advanced persistent threats/APTs), where both cyber-criminals and hacktivists are targeting selected organisations and persisting until they achieve their goals. New research presented in this report underlines the scale and real impact of the problem, the measures being taken to defend against targeted attacks and how effective they are. It should be of interest to anyone charged with defending their businesses against contemporary cyber threats or who wants to better understand their organisation’s vulnerability.  Access >>>

Table of contents

  • The trouble heading for your business
  • The impact of targeted attacks
  • How are targeted attacks perpetrated?

Access TechTarget
Premium Content for Free.

By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

More Premium Content Accessible For Free

  • A Computer Weekly buyer's guide to project management in the digital age
    CWE_BG_Oct-Nov_project_management-252.jpg
    E-Handbook

    ComputerWeekly looks at how project management is changing, as large projects with a defined endpoint are being swapped for an agile approach.

  • UK election special – who wins the digital vote?
    CWE_050515_ezine_26p-MED.jpg
    E-Zine

    In this week’s Computer Weekly, as the UK goes to the polls in the general election, we take an in-depth look at the political parties’ manifestos ...

  • Earning consumer trust in big data: a European perspective
    Earning-consumer-trust-in-big-data-252.jpg
    E-Handbook

    This report from DLA Piper and the Boston Consulting Group Regulatory explains the fundamentally different approaches and attitudes towards data ...