Threats from hackers and cyber criminals are constantly on the rise. Currently, cyber attacks and especially phishing emails are among the greatest risks for companies. A cyber attack often catches companies unprepared. With a trained crisis team, you can react confidently and professionally to IT attacks from hackers and avert damage. We train your IT staff to deal with spyware, ransomware and logic bombs.
Damage Caused by Cyber Attacks
IT attacks can be roughly divided into two categories: Data theft and data destruction. The former aim to steal data or assets from the company. For these cyber attacks, hackers use spy software or social engineering methods such as "CEO fraud." They use these to try to trigger financial transactions or steal company secrets. Key enterprises are often the target of invasive APT (Advanced Persistent Threat) attacks that penetrate deep into IT structure.
Attackers from the second category are not interested in corporate data. They want to cause damage or extort money. With ransomware, they threaten to encrypt data if the victim is not willing to respond to the cyber extortion and pay a ransom. Even a disgruntled employee becomes a threat with a logic bomb that deletes all accessible data at a set time.
Cyber Crisis Staff Drills Prepare for Cyber Attack
The RiskWorkers team holds company-wide cyber crisis staff exercises in which we expose a company's IT crisis staff to simulated attacks. The realistic simulations provide insight into how effectively employees from the IT crisis staff handle cyber attacks in an emergency. In addition to the personnel, the established processes for defending against attacks are put to the test. Are they up to date? Are there opportunities for improvement? Are they scalable enough for the company to grow? In short, we give the IT crisis team the opportunity to rehearse the emergency without putting company assets at risk.
Scenario I: Ransomware
Selected managers simultaneously receive a threatening email that employees' personal files will be encrypted if they do not fulfill a ransom demand within 24 hours. Two days later, a backdoor malware encrypts files on 200 client systems.
Scenario II: Advanced Persistent Threat
An attacker uses social engineering to plant spyware that grants him administrator privileges via Privilege Escalation. From here, he gains access to other parts of the IT infrastructure through lateralization. After the cyber attack, important business secrets flow out via encrypted DNS backchannels until they are discovered by chance.
Scenario III: Logic Bomb
An employee is threatened with losing his job. Out of frustration, he installs a Logic Bomb on one of the company's servers, which starts deleting stored files at a predefined time.
With our security training, your company is well prepared against IT attacks. We train your IT staff using cyber crisis staff exercises.
Are you interested in the online course? We will be happy to activate a test account for you. You can watch the learning video at your convenience and decide whether it is suitable for you and your employees. No obligation.