Page 8 - EngineerIt July 2021
P. 8

CYBERSECURITY
























        Awareness and training are key




        in defending against blended



        cybersecurity threats







          Cyber threat awareness training is key to creating a human firewall. Many of these attacks
          require human intervention at some point, so they can be mitigated, to an extent, through
          proper training and awareness.




                hile blended cybersecurity   A botnet is a network of private computers which is infected with the malicious software
                threats are not new, they are   and controlled without the owner’s knowledge.  They could then launch denial of service
        Wfairly sophisticated and multi-     (DoS) attacks or use your infrastructure to generate spam,” says Pinnock.
        staged in nature, meaning that they are   He adds that the main difference between blended and normal cybersecurity threats
        difficult to protect against and can pose   is that the former use multiple methods to propagate and attack a system or organisation,
        a considerable threat to organisations’   making this a complicated and multi-stage attack that is difficult to prevent. Like normal
        IT environments. A blended threat    threats, blended threats tend to exploit the same channels and vulnerabilities, because
        typically uses and exploits multiple   threat actors know they work. Pinnock says that in some 90% of cases, blended attacks
        vulnerabilities in an attack chain, says   will use email as the initial threat vector, with the remainder generally using the web.
        Brian Pinnock, senior director of sales
        engineering (EMEA) at Mimecast,
        adding that the severity of a blended
        threat will depend on the specific
        vulnerabilities that are targeted.
           “For example, a threat actor or
        cybercriminal will launch a phishing
        campaign against an organisation by
        sending emails with infected links that
        redirect to malicious websites. When
        a user clicks on these links, they could
        download a piece of malware like a
        trojan that spreads laterally and creates
        a backdoor into various systems. There
        are various malicious activities they
        could undertake, such as ransomware,
        data theft or the creation of a botnet.   Brian Pinnock                   Simeon Tassev



                                                    EngineerIT | July 2021 | 6
   3   4   5   6   7   8   9   10   11   12   13