Technology -> Infrastructure
Published: March 2013
Cyber-criminals use targeted attacks to steal regulated data and/or intellectual property, while hacktivists use them to damage a given business in some way. Whatever is thought of the individuals behind such attacks, they tend to be technically competent and are finding it easy to outwit existing IT security measures. Most businesses are currently lagging behind their attackers in an on-going arms race and need to do more to ensure they avoid the damage that such attacks can cause: lost business, potential financial costs, lost competitiveness and, in the worse case, the collapse of businesses. There are advanced security tools available that are specifically designed to combat the techniques used to perpetrate targeted attacks; however, too few organisations are deploying them effectively.
By downloading you agree to our Terms and Conditions. These include information regarding use of your personal data.
Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761