Phone: 1 (800) 982-3332

Understanding Vulnerabilities

In recent posts on this blog, I’ve talked about which bad guys are likely coming after your assets—that’s the who. We also discussed a few reasons why—an employee with a grudge, for example, or a jealous competitor, or a greedy stranger. Having assessed all that, the next item to consider is how the attacks might take place. We started talking about the how in my last post, but it’s time to roll up our sleeves and really get technical.

That’s right, this post is about vulnerabilities.

Threats, Part II: External

In Threats, Part I, I talked about internal threats—such as current and former employees and subcontractors—who may have ill intent or may just be thoughtless with data. But when it comes to threat assessment, internal threats amount to less than half of your worries. So let’s talk the other side of the equation: external threats. just like for their insider counterparts, you’ll need all the intelligence about them that you can get. Who are they? What are their motives?

Threats, Part I: Internal

In Asset Classification Basics, I introduced one of the most basic tenets of cybersecurity: if there’s something of value to you (an asset), then it’s of value to someone else. In my business, those “someone else”s are referred to as threats. To get a handle on your specific situation, you’ll need to perform some threat assessments. That may sound like an intimidating term, but it’s fairly straightforward. Threat assessments help you answer two of the most important questions in cybersecurity: who might be coming after your assets, and how might that occur?