Logo: Practical Cybersecurity

Webinar Series

2nd Thursday of Every Month @ 10:30 AM

Next Topic

Lost Laptops & Stolen Cells:
What to Do About Lost Devices

Providing Solutions That Work Since 2003!

104 1/2 W 9th Ave Suite 500
Winfield, KS 67156

Mon - Thurs 8 am - 5 pm CT
Fri 8 am - 4 pm CT

sales@custominternet.biz

Is My Network Really Under Attack?

Facebook
LinkedIn
X
Pinterest
Woman sitting in front of laptop with her head resting on her hand

Table of Contents

That’s a good question, isn’t it? Part of what makes the need for cybersecurity so hard to understand is that most of us really can’t “see” cyber attacks taking place against our network. And since many of these attacks are carried out by people far away from our location, we wonder what real damage they can do. But cyberattacks are real, and we need to be prepared for them to happen.

I liken preparing for cyberattacks to the preparations that each of make to care for our home, family, or business. For example, in my home my wife and I have implemented a number of procedures and processes to keep our family safe. I’ve got locks on my doors and windows to keep intruders out. There’s a peep hole in our front door so we can see who is on the other side. When our kids were little we practiced fire evacuation procedures. I’ve got important documents secured against fire, flood, or theft by storing copies in the bank safe deposit box. And finally, my insurance policy allows my family to recover in the event of catastrophe.

I encourage businesses and organizations to take a similar view of the need for cybersecurity. Cyber attacks take place all the time, so we need to make appropriate preparations. We need to put virtual ‘locks’ on our networks to keep intruders out. We need to implement systems to ‘see’ who is trying to attack and what they are trying to do. Plans and procedures should be in place in the event of cyberattack. Having good data protection plans is important so that our data is preserved. And instituting insurance to allow recovery in the event of a cyber catastrophe is a necessary consideration.

Below are maps that will help you ‘see’ cyberattacks going on around the world in real time. As you look at these maps, remember that these same type of attacks are going on against your network right now.

The Digital Attack Map is created by Google. It only highlights the top 2% of reported denial of service attacks going on in the world right now! I liken this type of attack to taking a sledgehammer to a door. These are often a brute-force type of attack.

The Kaspersky Cyberthreat Map is sponsored by the Kaspersky antivirus people. It shows, in real time, the discovery of viruses and malware around the world. Don’t be fooled by the appearance of less malware discovery in the United States. Since many people in the US use something other than Kaspersky, it won’t show as much activity in the US. Believe me, there’s lots of malware in the United States.

Feel free to contact us if we can help you improve your cybersecurity stance.

Practical Cybersecurity Webinars

Learn practical information your business or organization can put to use to improve your cybersecurity stance with the short, monthly webinars.

  • Lost Laptops & Stolen Cells
    What to do about lost devices
  • Cybersecurity Spelled Out
    CIS Critical Controls­®
  • The High Cost of Cheap Email
    Is your budget solution putting you at risk?
  • Your Digital Doppelganger?
    Lost of hackers would love to be you!
  • No Man Is An Island
    Why security culture matters!
  • Friends, Followers, and Frauds
    The unfriendly side of social media

 

Registration is FREE!

Facebook
X
LinkedIn
Pinterest
Email
Print

You might also be interested in...