A-Z of cyber threats—for staff

Published by a LexisNexis Practice Compliance expert
Precedents

A-Z of cyber threats—for staff

Published by a LexisNexis Practice Compliance expert

Precedents
imgtext
ThreatWhat is it?Our defensive measures
Advanced persistent threat (APT)Attackers gain unauthorised access to a system and remain undetected for a prolonged period of time. They may carry out unauthorised transfers of sensitive data.Even when they are detected, they may leave several ‘backdoors’ open so they can return.We ensure users are aware of the risk and of basic account security procedures.We use firewalls to inspect and filter traffic.We use antivirus software.
BotnetCollection of infected computers remotely controlled by a hacker.The hacker can share or sell access to the computers to other cyber criminals to be used to distribute spam or overload a system.See Malware and Hacking
Chain letterAn email that encourages the user to forward copies to other people.Not a security threat but can waste time and slow down mail servers.We ensure users know not to forward chain letters or hoaxes.We try to stay informed about chain letters and hoaxes.
Commercial identity theftBogus organisations (eg law firms) present a significant risk to the interests of consumers and our reputation if we become associated with one, eg because it
Powered by Lexis+®
Jurisdiction(s):
United Kingdom
Key definition:
Style definition
What does Style mean?

A form of a document used as a model for similar documents.

Popular documents