Threat | What is it? | Our defensive measures |
Advanced persistent threat (APT) | Attackers gain unauthorised access to a system and remain undetected for a prolonged period of time. They may carry out unauthorised transfers of sensitive data.Even when they are detected, they may leave several ‘backdoors’ open so they can return. | We ensure users are aware of the risk and of basic account security procedures.We use firewalls to inspect and filter traffic.We use antivirus software. |
Botnet | Collection of infected computers remotely controlled by a hacker.The hacker can share or sell access to the computers to other cyber criminals to be used to distribute spam or overload a system. | See Malware and Hacking |
Chain letter | An email that encourages the user to forward copies to other people.Not a security threat but can waste time and slow down mail servers. | We ensure users know not to forward chain letters or hoaxes.We try to stay informed about chain letters and hoaxes. |
Commercial identity theft | Bogus organisations (eg law firms) present a significant risk to the interests of consumers and our reputation if we become associated with one, eg because it |
To view the latest version of this document and thousands of others like it,
sign-in with LexisNexis or register for a free trial.