During this webinar we focused on the most commonly used attack vectors deployed externally and internally by hackers. We walked through the methods that hackers use to gain access into the network and learn best practices in preventing a breach from taking place. Relevant examples include: host-based attacks, network exploits, password attacks, and phishing examples.
In this webinar we discussed:
- Understand what methods hackers use to circumvent traditional security solutions
- How a penetration test actually works
- The most common mistakes employees make that lead to breaches
- What types of security solutions we recommend to drastically reduce chances of a breach