When: Thursday, July 12th, 2018
This webinar focused on the most commonly used attack vectors deployed externally and internally by hackers. We discussed the methods that hackers use to gain access into the network and learn best practices in preventing a breach from taking place. Relevant examples will include: host-based attacks, network exploits, password attacks, and phishing examples.
In this webinar we discussed:
- Understand what methods hackers use to circumvent traditional security solutions
- How a penetration test actually works
- The most common mistakes employees make that lead to breaches
- What types of security solutions we recommend to drastically reduce chances of a breach