It takes only 15 minutes for the threat actors to start scanning for vulnerabilities when they are discovered. How quickly do you respond to gaps in your cybersecurity?

It is obvious but even the biggest organisations and governments in the world will be responding slower that the threat actors – so there will always be gaps in the cyber security.

Hackers scan for vulnerabilities within 15 minutes of disclosure (bleepingcomputer.com)

Here is a real world example of a vulnerability in an update, being spotted quickly by the threat actors, and exploited:

‘Frenzied mob’ steals more than $156 million from crypto platform Nomad – The Record by Recorded Future

Crypto platform Nomad was robbed of more than $156 million in cryptocurrency on Monday evening after a vulnerability in a recent update was discovered and replicated by dozens of hackers.

Jonathan Greig, The Record

This could be you…

Two things you can do:

  • Train your people to recognise the types of threats targeted at them, primarily phishing emails and social engineering attacks
  • Have a cyber attack resilient back-up of everything to fall back on for business continuity and incident response.

Training options:

Cyber Awake | Train Your Team To Protect Against Cyber Attacks

Or this:

Clive Catton MSc (Cyber Security) – by-line and other articles

Social Engineering and Email Cyber Security Training 200