Sample recent incident: A cryptolocker can also encrypt your backup
A company receives an e-mail with an invoice in attachment. The invoice looks like and is thought to be a standard supplier's document. The company’s accountant clicks on the attachment and a few seconds later a ransom message appears on his screen (see figure). “all your information has been encrypted! If you want the key to unlock the encryption, you need to pay me 1.000 Bitcoins”. The company does not want to pay the cybercriminal. After all, there is no guarantee that he will actually return the lost data once he has received the ransom. To recover its data, the company decides to restore from a backup. Unfortunately, the backup device was still linked to the system, it has therefore been encrypted as well... |
Sample incident challenge: Response to DDOS attack you need experience A Distributed Denial of Service (DDOS) Attack is a targeted to put your system down. It has the potential to severely impact on the availability of your business operations. Those attacks are very sophisticated and difficult to get rid of. Most organisations do not dispose of internal technical skills to solve a DDOS attack. They will have to call upon external experts that should hopefully be available |
Sample incident: Phishing attack Phishing hackers use emails, hypertext links and Internet pages to redirect you to misleading and fake websites. You will be asked to disclose confidential data such as your bank account details or credit card number. A malicious email generally asks you to confirm your password, bank details, account numbers, credit card details or other similar data by clicking on a link contained in the message. The malicious link directs you to a fake page with an address that is almost identical to that of the original site. Any employee within your organisation may receive such an email in a busy day when they are less alert. |