![]() |
Cyber Security Landscape
|
*** Attack Methods - Phishing Attack *** You get an email that looks like its from someone you know It seems to be from one of your company’s vendors and asks that you click on a link to update your business account. Should you click? Maybe it looks like it’s from your boss and asks for your network password. Should you reply? In either case, probably not. These may be phishing attempts
|
![]() |
Mapped Buisness Risks | ||||||
Brand Damage | Data/Secret Loss | Service Disruption |
Mapped Cyber Risks | ||||||
Data Security / Loss | Extortion | Human Error | Basic Security Hygiene | Identity/Password Protection | Insider Threat |
Mapped Mitigation Methods | ||||||
Limit & Control Access | Protect Data | Manage Risks, Compliance and Controls | Block Threats & Attacks | Manage Threats & Vulnerabilities | Enable Visibility |
Mapped Products | ||||||
Cyberark Alero | Okta Advanced Server Access |
Mapped OEMs | ||||||
Cyberark | Okta |