{"id":737,"date":"2016-03-02T14:00:27","date_gmt":"2016-03-02T14:00:27","guid":{"rendered":"http:\/\/www.timwyatt.ca\/test\/?p=737"},"modified":"2016-03-02T20:57:10","modified_gmt":"2016-03-02T20:57:10","slug":"anatomy-of-a-breach-how-hackers-break-in","status":"publish","type":"post","link":"https:\/\/www.timwyatt.ca\/test\/?p=737","title":{"rendered":"Anatomy of a breach: How hackers break in"},"content":{"rendered":"<p>Did you know an attacker can be present on a network for more than 200 days before being detected? Imagine the damage that can be done to an organization during that time: Accessing sensitive data about your company, products, employees and clients. Altering the operating system on every computer in your network. Causing irreparable damage to your company &ndash; both in terms of dollars and damaged reputation &ndash; before you even know he&rsquo;s there.<\/p>\n<p>Hackers typically gain control of a network using a privileged account (e.g., domain admin) within 24-48 hours of initiating the attack. They move silently through the network, avoiding actions that would alert IT to their presence. If they are discovered, it&rsquo;s usually by chance or an external notification.<\/p>\n<p>Do you know how a security breach actually happens? How hackers get a foothold, and what they do once they&rsquo;re in? Most importantly: Are you as secure as you think you are? Join me for a free webinar to learn how a breach actually happens and the steps you can take to help prevent an attack, including:<\/p>\n<ul>\n<li>Common ways hackers get into your network, including phishing scams and targeted search results<\/li>\n<li>How hackers set up and manage long-term attacks<\/li>\n<li>Things you can do today to help prevent an attack<\/li>\n<li>The key response phases, including incident response, tactical recovery and strategic recovery<\/li>\n<li>Tips for developing an effective communications plan that won&rsquo;t compromise your data&rsquo;s security<\/li>\n<\/ul>\n<p>I hope you will join me and my colleague Jim Moeller, from the Enterprise Cybersecurity Group, to learn more about this critical topic. The &ldquo;Anatomy of a Breach: How Hackers Break In&rdquo; webinar will be held March 8, 2016. <a href=\"https:\/\/info.microsoft.com\/Anatomy-of-a-breach-Registration.html?ls=Blogs?wt.mc_id=US_CE_TC_OO_BLOG_NONE&amp;LS=&amp;LSD=\" target=\"_blank\">Registration is now open<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Did you know an attacker can be present on a network for more than 200 days before being detected? Imagine the damage that can be done to an organization during that time: Accessing sensitive data&hellip;<\/p>\n<p><a class=\"readmore\" href=\"https:\/\/www.timwyatt.ca\/test\/?p=737\">Read More<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-737","post","type-post","status-publish","format-standard","hentry","category-cloud","comments-off"],"_links":{"self":[{"href":"https:\/\/www.timwyatt.ca\/test\/index.php?rest_route=\/wp\/v2\/posts\/737"}],"collection":[{"href":"https:\/\/www.timwyatt.ca\/test\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.timwyatt.ca\/test\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.timwyatt.ca\/test\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.timwyatt.ca\/test\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=737"}],"version-history":[{"count":1,"href":"https:\/\/www.timwyatt.ca\/test\/index.php?rest_route=\/wp\/v2\/posts\/737\/revisions"}],"predecessor-version":[{"id":738,"href":"https:\/\/www.timwyatt.ca\/test\/index.php?rest_route=\/wp\/v2\/posts\/737\/revisions\/738"}],"wp:attachment":[{"href":"https:\/\/www.timwyatt.ca\/test\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=737"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.timwyatt.ca\/test\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=737"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.timwyatt.ca\/test\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}