November 18, 2019
Do you know who would be most likely to hack your information system? It’s quite possible you’ve never even thought of it.
Determined attackers are constantly finding new methods to outwit traditional security systems, using an arsenal of techniques to attack from every angle.
There are many different types of attackers, each with their own reasons for doing what they do. Knowing who is behind your threats and what their motivations are, can help you implement security measure to put them on the defence.
Why do hacker personas matter?
Building hacker profiles helps us to identify what the likely targets are going to be, how skilled they are, and what kind of defences we need in order to protect ourselves. The greater the accuracy and completeness of the persona, the better chance we have of stopping them.
- Questions to ask your pen-test provider
- On-demand webinar: How to develop security vulnerability management programmes
- Pen-tester tales: Password are a security weak spot
- The difference between a Vulnerability Scan and a Penetration test
- A buyers guide to penetration testing services
About Comtact Ltd.
Comtact Ltd. is a government-approved Cyber Security and IT Managed Service Provider, supporting clients 24/7 from our ISO27001-accredited UK Security Operations Centre (SOC).
Located at the heart of a high security, controlled-access Tier 3 data centre, Comtact’s state-of-the-art UK Cyber Defence Centre (SOC) targets, hunts & disrupts hacker behaviour, as part of a multi-layered security defence, to help secure some of the UK’s leading organisations.