Modus Operandi of the Cyber Attack
Cyber attacks can take many different forms. In this video, we will look from a high-level at the cornerstones of cyber security which are Confidentiality, Integrity and Availability. We will define a cyber attack and the different stages of a cyber attack. We will look at the different types of hackers and we will talk about some of the common attacks on small/medium businesses. This video will lay the foundation so you can understand how the Essential Eight helps protect you and your business.