Everything is going automatic and those looking to perpetrate data breaches with malware are no different emphasizing the need for individuals and organizations to be better prepared to keep the cyber door closed to potential threats. With the change in methodology used by threat actors, moving from manual manipulation to malware, the change greatly widens the pool of targets and enhanced effectiveness, suggests David Ostertag, global investigation manager for Verizons investigative response unit. “What we see now is the use of malware in these breaches as opposed to manual processes,” Ostertag said last week during a Verizon presentation in downtown Toronto.
TechnologyRisk Management