3 Pillars of ISMS

Every day, you might use a mobile device to make voice calls, send text messages, post articles on social media platform, and access information on the web. You likely also use a laptop or tablet to communicate, perform work, store work files, video conference, or watch recorded files. Your personal and work data are recorded on these devices moment-by-moment. These files are backed up in local as well as offsite infrastructure. Each new device doesn’t just drive traffic, it also dramatically expands the network attack surface - increasing the opportunity for cybercriminals to leverage sophisticated methods to exploit these opportunities. As a result, we are seeing the rise in cybercrime, and cybersecurity incidents that exploit data found on your devices, on-premises systems, as well as offsite cloud infrastructure.

Compromised, now what?

The online threat landscape is ever-changing. Recently, a functional Microsoft Remote Desktop exploit was publicly released that allows an attacker to gain System access; furthermore, all versions of the popular email delivery software EXIM is reported to be remotely exploitable, enabling an attacker with superuser access to 57% of the worlds email delivery systems.