It is obvious but even the biggest organisations and governments in the world will be responding slower that the threat actors – so there will always be gaps in the cyber security.
Hackers scan for vulnerabilities within 15 minutes of disclosure (bleepingcomputer.com)
Here is a real world example of a vulnerability in an update, being spotted quickly by the threat actors, and exploited:
Crypto platform Nomad was robbed of more than $156 million in cryptocurrency on Monday evening after a vulnerability in a recent update was discovered and replicated by dozens of hackers.
Jonathan Greig, The Record
This could be you…
Two things you can do:
- Train your people to recognise the types of threats targeted at them, primarily phishing emails and social engineering attacks
- Have a cyber attack resilient back-up of everything to fall back on for business continuity and incident response.
Training options:
Cyber Awake | Train Your Team To Protect Against Cyber Attacks
Or this:
Clive Catton MSc (Cyber Security) – by-line and other articles