Personal data records belonging to more than 4 billion people were affected by the top 10 data breaches alone in the last decade .
Businesses are losing market capitalization , reputation and customers , besides costly legal consequences once these data breaches surface . And , statistics indicate cybercrime is here to stay and thrive . As business dependency on IT grows , so does cyber criminals ’ interest in taking advantage of this trend . So , what can be done ?
How can enterprises around the globe effectively fight cybercrime and prevent costly data breaches ?
Data exfiltration or destruction , IT service unavailability and performance drops due to cryptojacking are only the last stage of a much longer and normally complex chain of events , known as the attack kill-chain .
The attack kill-chain is a sequence of actions an attacker follows in preparing and executing an attack . Most attacks , especially advanced attacks , go through several phases :
1 . Reconnaissance : Intruder selects target , researches it , and attempts to identify vulnerabilities in the target infrastructure .
2 . Weaponization : Intruder creates ( or finds on the exploit databases ) remote access malware weapon , such as an exploit , virus or worm , tailored for one or more vulnerabilities . u