5 Ways to Identify a Targeted Attack
If you’re not quite sure what a targeted attack on your systems looks like, then here’s the cybersecurity primer you’ve been seeking. Former CIA cyberanalyst Kevin Thompson, now with FireEye, lays out the five things that reveal whether a cyberattack is targeted and some ways to foil such attacks as well. He shares his knowledge with government tech leaders at the StateTech Cybersecurity Summit.
To learn more about the latest threats state and local governments face, check out the others videos from the StateTech Cybersecurity Summit.
- Kevin Thompson, Threat Analyst at FireEye
- Strategic file names are often used to lull people into a false sense of security.
- There's a watering hole effect where malware proprietors target mainstream sites that everyone goes to and poisons the well to gain access to corporate networks.