dcsimg

The ABCs of Advanced Persistent Threats

  • The ABCs of Advanced Persistent Threats-

    Vulnerabilities

    Known vulnerabilities have been the sources of a breach in the past. It’s important to keep up with vulnerabilities and issued patches, both by large companies like Microsoft and Adobe, but also the third-party applications that end users frequently use. The 2014 State of the Endpoint report lists third-party applications as one of the top sources of risk, according to 66 percent of IT professionals.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28

The ABCs of Advanced Persistent Threats

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28
  • The ABCs of Advanced Persistent Threats-23

    Vulnerabilities

    Known vulnerabilities have been the sources of a breach in the past. It’s important to keep up with vulnerabilities and issued patches, both by large companies like Microsoft and Adobe, but also the third-party applications that end users frequently use. The 2014 State of the Endpoint report lists third-party applications as one of the top sources of risk, according to 66 percent of IT professionals.

As employees and IT professionals return from the holidays, many are doing so with 2014 New Year’s resolutions in mind. For IT pros, we hope that one of your resolutions is to bolster your organization’s security and defenses in 2014. One of the rising threats that many IT professionals should be concerned about defending against in the new year is advanced persistent threats (APTs). According to the 2014 State of the Endpoint Report, conducted by the Ponemon Institute and sponsored by Lumension, 40 percent of organizations experienced an APT attack in the last 12 months. Paul Zimski of Lumension provides an overview of many of the key terms and themes associated with APTs to prevent you from becoming one of them.