Are you a CEO or CFO?

Cybercrime is knocking, are you ready: Series 6.
VULNERABILITY ASSESSMENT
I will start with a bombshell. Interestingly, it’s not about money, nope.

It’s about the disease. About our health, you and me

From late 2019 through the first half of 2020, our planet is increasingly engulfed in a worldwide pandemic; COVID-19. Coronavirus is spreading like a wildfire. All manner of media is awash with all sorts of information about Coronavirus, but most importantly, the stay safe messages.

While everyone is prone to contracting COVID-19, the messages coming in from the health experts and the global casualty/recovery statistics indicate that some people are more VULNERABLE to catching and developing complications from COVID-19, than others.

How? You ask.

Well, here are the answers.

  1. Sadly, elderly people (over the age of 65) are specifically VULNERABLE because of their aged body systems. Some commentators believe Italy has been worst hit by this pandemic because of its higher percentage of the elderly population.
  2. Anyone (young or old) with an underlying health condition and weakened immunity is more VULNERABLE to COVID-19 complications
  3. All people who have travelled to countries that have been labelled as “high risk” countries are more exposed to the disease, compared to those that have not. And all those moving around in crowded environments of all manner, are more at risk, than those who aren’t.
  4. People who eat healthy stand better chances of fighting off the disease than those without because of their stronger immune systems.

How does this relate to hackers and Cyber Intrusion?

Okay, let’s examine……..

While conducting their scanning processes, intruders will scour target computer resources for exploitable VULNERABILITIES.

Computer systems, software, web servers and web applications that are regularly updated and well patched are less VULNERABLE to cyber attacks than those that are not.

Different computer operating systems will have vulnerabilities and configurations which are dissimilar to others. Did you know that Android is the most vulnerable operating system, followed by Linux?

And hackers employ pretty effective tools for their vulnerability analysis including NMAP, Nessus and MBSA. They will grab banners of the installed operating systems and use this information to stealthily plan their attacks.

Oh, one last thought, before we go. We all need to be safe, don’t we? We need to keep our organizations even more secure. We need to patch up our vulnerabilities. And this is your wake up call. I can’t tell you how many individuals and organizations have been hit. To safeguard individual and company reputation, the attack incidents are never made public. Painful as they are, they are dealt with privately.

Today, it’s no longer a question of if. It’s a question of when. And any CEO or CFO who thinks otherwise, he/she is in self-denial. Isn’t this their own fault?

Suggestion for You:

As a leader, better don’t get caught in that trap. Heed the call. Get moving. Contact the experts.
Call Summit Consulting for a demo on vulnerability assessments for your entity. While others could end up grappling with cyberattack incidents, you’ll surely end up driving home fist-pumping in the air!

Remember to stay #COVID-19 safe and get cyber safe!

Share this

Leave a Comment

Scroll to Top
Chat with us
Chat with us
Questions, doubts, issues? We're here to help you!
Connecting...
None of our operators are available at the moment. Please, try again later.
Our operators are busy. Please try again later
:
:
:

The data collected by this form is used to get in touch with you. For more information, please check out our privacy policy
Have you got question? Write to us!
:
:

The data collected by the chat form is used to get in touch with you. For more information, please check out our privacy policy
This chat session has ended
Was this conversation useful? Vote this chat session.
Good Bad