Author Archives: leavcharl1

Charles Leaver – More And More Advanced Malware Attacks Are Occurring So Protect Your Network

Published by:

Written By Charles Leaver CEO Ziften

If you are in doubt about malware hazards increasing then please check out the rest of this post. Over the past couple of years there have been a variety of cyber security research studies that have revealed that there are countless brand-new malware hazards being developed each year. With limited security resources to cope with the variety of malware dangers this is a real concern. All organizations have to look carefully at their cyber security processes and search for areas of improvement to resolve this genuine threat to data security.

Not all malware is the same. A few of the malware strains are more destructive than others, and security personnel need to understand the malware threats that can cause genuine damage on their company. It was noted that some malware could be categorized as more irritating than threatening according to George Tubin who is a security intelligence contributor. Yes they can inflict issues with the efficiency of computers and need removal by tech support workers, however they will not trigger the same level of problems as the malware that impacted Target and Sony with their cyber attacks.

Advanced malware attacks need to be the focus of security teams discussed Tubin. These malicious strains, which are small in number compared to common malware strains, can cause significant damage if they are enabled to penetrate an organization’s network.

Tubin stated “due to the fact that the majority of malware detection software is created to find standard, known malware – and since standard, recognized malware represents the vast majority of enterprise malware – most companies incorrectly think they are discovering and eliminating practically all malware dangers.” “This is exactly what the advanced malware hackers desire them to believe. While many organizations are satisfied with their malware detection stats, this small sliver of innovative malware goes unnoticed and remains in position to trigger terrible damage.”

The Integrity Of Data Is Under Serious Risk From Advanced Malware

There are zero day malware threats, and these can infiltrate the defenses at the boundary of the network without being detected and can stay active within the environment for months without being seen. This means that cyber lawbreakers have a lot of time to gain access to delicate data and steal essential information. To combat advanced malware and keep the organization environment safe, security personnel ought to enact advanced endpoint threat detection and response systems.

It is vital that organizations can monitor all of their endpoints and guarantee that they can determine malware hazards quickly and eliminate the hazard. Cyber crooks have a number of alternatives to make the most of when they target an organization, and this is even more of a problem as organizations become more complex. Individual laptop computers can be a genuine gateway for cyber wrongdoers to infiltrate the network states Tubin. When a laptop links to a point that is unsecure outside of the environment, there is a likelihood that it can be jeopardized.

This is a genuine factor underlining why security groups need to truthfully examine where the greatest weaknesses are and take restorative action to repair the problem. Endpoint security systems that continually monitor endpoints can offer immense benefits to companies who are concerned about their network defenses. At the end of the day, an organization should execute cyber security processes that match their requirements and resources.


Charles Leaver

Charles Leaver – Don’t Stress Your Environment. Use A Lightweight Solution For Endpoint Security

Published by:

Charles Leaver Ziften CEO Presents A Post By CTO David Shefter

If you are an organization with 5000 or more employees, it is likely that your IT Security and Operations groups are overwhelmed with the degree of data they need to sift through for just a small percentage of visibility about what their users are doing on a recurring basis. Antivirus suites have been installed and they have actually shut off USB ports and even enforced user access restrictions, but the risk of cyber attacks and malware problems still remains. What action do you take?

Up to 72% of advance malware and cyber criminal invasions take place in the endpoint environment, so says a Verizon Data Breach Report. Your business needs to ask itself how essential its reputation is first. If you take Target as an example, it cost them over $ 6 Billion in market cap loss because of a malware attack. Sadly the modern world positions us constantly under attack from unhappy or rogue staff members, anarchists and other cyber bad guys. This circumstance is only likely worsen.

Your network is secured by a firewall program etc but you are not able to see what is occurring past the network switch port. The only real method to resolve this threat is by implementing a solution that works well with and compliments existing network based solutions that are in place. Ziften (which is Dutch for “To Sift”) can provide this solution which offers “Open Visibility” with a lightweight technique. You need to manage the whole environment which includes servers, the network, desktops etc. However you do not wish to add extra overheads and tension on your network. A significant Ziften commitment is that the solution will not have a negative influence on your environment, however it will offer a deeply impactful visibility and security solution.

The groundbreaking software application from Ziften completely understands machine behavior and abnormalities, allowing analysts to zoom in on sophisticated hazards faster to lower dwell time to a minimum. Ziften’s solution will continuously monitor activity at the endpoint, resource consumption, IP connections, user interactions and so on. With the Ziften solution your organization will be able to determine faster the root cause of any intrusion and fix the problem.

It is a lightweight solution that is not kernel or driver based, minimal memory use, there is little to no overhead at the system level and almost zero network traffic.

For driver and kernel based solutions there are extreme accreditation requirements that can take longer than 9 months. By the time the new software application is developed and baked, the OS could be at the next version of release. This is a time consuming, non-supportable and troublesome process.

The Ziften approach is a genuine differentiator in the marketplace. The application of a really light weight and non invasive agent and also executing this as a system service, it conquers the stresses that the majority of brand-new software solutions introduce at the endpoint. Ease of application leads to faster times to market, easy support, scalability, and simple solutions that do not restrain the user environment.

To sum up, with the existing level of cyber threats and the dangers of a cyber attack increasing daily that can significantly taint your reputation, you have to implement constant monitoring of all your endpoint gadgets 24/7 to make sure that you have clear visibility of any endpoint security dangers, gaps, or instabilities and Ziften can deliver this to you.


Cyber Readiness Is Critical To Prevent Attacks So Enact These Five Items – Charles Leaver

Published by:

Presented by Charles Leaver, Chief Executive Officer Ziften Technologies – Written By Dr Al Hartmann

1. Security Operations Center (SOC).

You have a Security Operations Center implemented that has 24/7 coverage either in house or outsourced or a mix. You do not desire any spaces in cover that might leave you open to intrusion. Handovers need to be formalized by watch managers, and suitable handover reports offered. The supervisor will provide a summary each day, which provides information about any attack detections and defense countermeasures. If possible the cyber bad guys must be identified and differentiated by C2 infrastructure, attack method etc and codenames given to these. You are not attempting to attribute attacks here as this would be too difficult, but simply noting any attack activity patterns that correlate with various cyber bad guys. It is necessary that your SOC familiarizes themselves with these patterns and have the ability to distinguish attackers or even spot brand-new hackers.

2. Security Vendor Support Readiness.

It is not possible for your security workers to learn about all elements of cyber security, nor have visibility of attacks on other companies in the same market. You have to have external security support groups on standby which might include the following:.

( i) Emergency situation response group support: This is a short list of suppliers that will respond to the most severe of cyber attacks that are headline material. You ought to ensure that one of these vendors is ready for a significant risk, and they must get your cyber security reports on a regular basis. They should have legal forensic capabilities and have working relationships with law enforcement.

( ii) Cyber risk intelligence assistance: This is a supplier that is gathering cyber threat intelligence in your vertical, so that you can take the lead when it concerns risks that are emerging in your vertical. This team needs to be plugged in to the dark net trying to find any indications of you organizational IP being discussed or chats between hackers discussing your company.

( iii) IoC and Blacklist support: Due to the fact that this involves numerous areas you will require several vendors. This includes domain blacklists, SHA1 or MD5 blacklists, IP blacklists, and signs of compromise (suspect config settings, registry keys and file paths, etc). It is possible that some of your installed security services for network or endpoint security can supply these, or you can select a third party professional.

( iv) Support for reverse engineering: A supplier that focuses on the analysis of binary samples and offers comprehensive reports of content and any prospective risk and also the family of malware. Your present security vendors may provide this service and specialize in reverse engineering.

( v) Public relations and legal support: If you were to suffer a significant breach then you want to ensure that public relations and legal support remain in place so that your CEO, CIO and CISO do not become a case study for students at Harvard Business School to learn about how not to handle a significant cyber attack.

3. Inventory of your assets, category and readiness for security.

You have to guarantee that of your cyber assets undergo an inventory, their relative values categorized, and implemented worth proper cyber defences have actually been enacted for each asset category. Do not rely totally on the assets that are known by the IT team, employ a business system sponsor for asset recognition particularly those hidden in the public cloud. Also make sure crucial management procedures are in place.

4. Attack detection and diversion readiness.

For each one of the significant asset classifications you can create reproductions using honeypot servers to draw cyber crooks to infiltrate them and divulge their attack techniques. When Sony was attacked the hackers found a domain server that had actually a file called ‘passwords.xlsx’ which consisted of cleartext passwords for the servers of the business. This was a good ruse and you ought to utilize these tactics in tempting places and alarm them so that when they are accessed alarms will sound instantly meaning that you have an immediate attack intelligence system in place. Modify these lures often so that they appear active and it doesn’t appear like an apparent trap. As the majority of servers are virtual, hackers will not be as prepared with sandbox evasion approaches, as they would with client endpoints, so you might be fortunate and really see the attack occurring.

5. Monitoring preparedness and continuous visibilities.

Network and endpoint activity should be kept track of continuously and be made visible to the SOC group. Because a lot of client endpoints are mobile and for that reason outside of the organization firewall software, activity at these endpoints should likewise be monitored. The tracking of endpoints is the only particular method to perform process attribution for monitored network traffic, because protocol fingerprinting at the network level can not constantly be trusted (it can be spoofed by cyber bad guys). Data that has actually been kept track of needs to be conserved and archived for future referral, as a number of attacks can not be determined in real time. There will be a need to trust metadata more often than on the capture of full packets, since that enforces a substantial collection overhead. However, a variety of dynamic threat based monitoring controls can lead to a low collection overhead, and also react to major hazards with more granular observations.

Charles Leaver – The City Of Chicago Is More Prone To Data Breaches Than Any Other City

Published by:

From the desk of Charles Leaver CEO Ziften Technologies

If you live in Chicago or run a business or work there, you should focus on a report that divulges that Chicago is one of the most susceptible cities in the U.S.A for cyber attacks. The National Consumers League, who are Washington D.C. based group who focus on consumer assistance, published the report as specified by The Chicago Sun-Times. The report exposed some worrying findings and among these was the discovery that 43% of the city’s population reported that their information was stolen and that their information was utilized to make purchases on the Internet. This supposes that cyber lawbreakers are being more forward thinking when it concerns taking individual data.

So if you suffer a cyber attack on your business you should expect the stolen data to be used for harmful functions. The National Consumers League vice president of public policy, John Breyault, said “Chicago residents who get a data-breach alert needs to pay specific focus on purchases made online (in their name).”.

The residents of Chicago are not being inactive and just dismissing this important report. The Illinois state Attorney General Lisa Madigan, is leading the efforts to develop a federal group who will have the duty of examining data security events, so state CBS Chicago. Madigan’s office are examining the attacks on Neiman Marcus and Target as well as others and Madigan feels that with the current severity of attacks the government needs to take responsibility and deal with the problem.

Madigan stated “It simply makes sense that someone has to take the responsibility in this day and age for putting in place security standards for our personal monetary info, because otherwise you have disturbance and a significant effect, potentially, to the general market.” The time frame for establishing this group is unclear at present. Making things occur at the federal level can be extremely slow.

Endpoint Threat Detection And Response System Will Offer Protection.

If you run a company in Chicago (or elsewhere) then there is no requirement for you to wait on this federal group to be established to protect your company’s network. It is recommended that you enact endpoint detection and response software because this will provide significant security for your network and make it essentially cyber attack proof. If you fail to make the most of robust endpoint threat and detection systems then you are leaving the door wide open for cyber bad guys to enter your network and cause you a lot of trouble.


Charles Leaver – Norway Bank Attacks Underline The Need For Endpoint Security

Published by:

Written by Charles Leaver Ziften CEO

The world of global hacking consists of so many cyber wrongdoers that it would be impossible to call all of them. However, there are some hacking cooperatives that make their voices heard louder than the others, and a fine example of this is the Anonymous group. Primarily developed to be a hacking group that was loosely put together, on occasions the Anonymous group will carry out high profile attacks by utilizing the hacking proficiency of its members to make life hard for governments and big corporations. Digital Journal has revealed that Norway banks have ended up being a target of the Anonymous group.

Anonymous Make All Of Their Attacks Simultaneously As A Display Of Force

Through making use of cyber attacks Anonymous is a group that wants to show the world the power that is has. It surprised nobody that the Norwegian part of Anonymous made the decision that they would attack a number of the country’s banks, the decision was also made to infiltrate all the banks at the same time. On a particular time on the very same day, eight of Norway’s biggest banks were hacked by the group, and this caused the electronic banking facilities of the 8 banks being seriously interfered with.

Supervisor of the Evry security team, Sverre Olesen, said “the degree of the attack is not the greatest we have actually seen, but it is the very first time that such an attack has hit a lot of central agencies in the monetary sector in Norway”.

Besides demonstrating the power that the Anonymous group has, the fact that all the attacks took place at the same time shows that cyber crime is becoming more of a collaborative effort with hackers teaming up to compare notes and offering a united force against selected targets. Any organization is prone to this.

They Enjoy Remaining in The Spotlight

Most of the cyber criminals are not trying to find any publicity, they just want to take cash quickly. They just wish to get in and out quick. But the Anonymous group delights in remaining in the limelight even though there is no public connection to any specific person.

According to allvoices, after the cyber attack on the Norwegian banks had actually taken place Anonymous did not lose any time taking credit for this in public. The cyber attacks on the banks not only interfered with the online pay platforms but likewise produced severe troubles for consumers of the banks.

This attack by Anonymous highlights the need for all companies to enable endpoint threat detection and response systems that will safeguard them from the same disastrous incidents happening to them.


Charles Leaver – The Use Of Layered Security Would Have Helped The Banks That Were Attacked

Published by:

Charles Leaver CEO Ziften writes

There have been a variety of cyber attacks on ATMs which have permitted wrongdoers to steal millions of dollars. In order to combat this threat, financial businesses have to comprehend the different aspects of cyber security and the reasons behind their utilization. Financial data will always be highly desirable to cyber wrongdoers as most wish to generate income quick which means that consumer financial records and ATMs are both at risk. To carry out the best security measures, financial companies have to know the layers that they require to keep the bad guys away.

Sadly, unlike mythological monsters of legend, there isn’t a single weapon in the security system toolbox that can safeguard a server from being hacked. There are no cure-all applications to stop hacking. The very best method to safeguard online servers of ATMs and banks, the financial companies will have to use a variety of various methods to keep their details safeguarded. According to PC World, the hackers that infiltrated the ATMs did so by utilizing malware that was really hard to discover. Banks truly need to utilize endpoint security as cyber crooks can try to infiltrate systems by developing hacking tools that are a threat to bank security through using computers that are utilized by bank tellers. This will provide a lot of choices to permeate the network of ATMs.

A Human Eye Is Needed With Contemporary Security

The days have actually now gone where firewalls and automated services were enough to keep hackers at bay. Banks should be utilizing endpoint threat detection and response systems to keep out the cyber crooks. There was a post on about United States bank accounts being penetrated by cyber crooks from Russia and this shows the destructive impact that hackers can have on banks that are not effectively secured. Making use of security workers 24/7 with items supplied by security companies is one method to make sure that a network is not compromised, but this is only one piece of the security puzzle that has to be applied.

There needs to be a change in the company culture so that using strong passwords is adopted, a policy that values security introduced that avoids individuals bringing USB drives, and other computer devices, to the office without permission are actually essential. This and other policies that will prevent malicious aspects from infiltrating a server are all crucial. A malware attack can be prevented earlier with the use of endpoint security. Using more powerful locks so that the criminals might not break through and set up the harmful software application would likewise have actually assisted.

The use of different security layers to prevent cyber crooks accessing networks an organization will purchase time for humans to recognize and stop the hazards before any damage is triggered. A passive security system that responds far too late is not sufficient to offer the high levels of security that organizations need to keep their data safe.


Do Not Underestimate The Threat Of Malware As It Can Be Catastrophic – Charles Leaver

Published by:

By Charles Leaver, Ziften CEO

There have actually been a variety of advancements in the arena of cyber security and it is more important now than ever that organization’s must team up. Naturally there will constantly be the fear of exposed secrets and the loss of financial data; a number of malware strains are showing to be really insidious and disastrous for companies. The oil and gas sectors and the monetary market have to be concerned about their relationships with a more comprehensive series of companies that are consumers and suppliers, and what a cyber attack on any of those will imply to their company. A cyber attack not only impacts the company that has actually been attacked however also their clients and others that deal with their clients.

When endpoint threat detection software is combined with anti malware, firewall software, and encryption services it can be essential for combating the danger of a various series of risks. Integrated, these systems are a real force when it comes to discovering and trapping any harmful code that tries to infiltrate an organization’s servers. Utilizing this as a metaphor, the organization’s security officer in control of this combination is the spider – able to respond to subtle changes through using endpoint threat detection and response systems that informs the officer when something is occurring on the servers. While anti-malware software, firewall software and encryption all supply points at which it is tough for harmful traffic to make a move on a server, the spider is the aspect that eventually removes the infiltration. The human element is required due to the fact that some harmful traffic will be aware of most standard security systems that will be in place to protect against attacks. Human intelligence is needed to respond to malware as it tries to penetrate an organization’s network and fix the problem.

Understanding Cyber Attacks And Their Effect on Partners

It is true that many monetary and oil and gas companies do invest a great deal of money on cyber security due to the fact that they understand the huge dangers behind having customer data stolen, or experiencing a devices breakdown, or possibly both, but there are even more ramifications. If a major bank suffered from a breach then this might seriously impact consumer trust in banks and lead to financial collapse. According to Eagleford Texas, there are some factors out there, such as BlackEnergy, that are intent on attacking United States energy systems and destabilize crucial financial institutions within the borders of the USA. If this holds true then banks need to carry out endpoint threat detection and response systems as a way of monitoring even subtle changes on their network.

The fast pace of change in technology will always raise concerns about cyber security. The Human-Centric Security Initiative at the University of New Mexico has originated the advancement of real cyber security awareness among the experts whose job it is to lessen the damage that can be brought on by cyber attacks. This charge is lead by organizations that have a mix of endpoint threat detection systems, antivirus and anti malware suites, firewalls, and encryption services. If an important service such as electronic banking is jeopardized then this can have ramifications beyond data theft and have an impact on individuals’s lifestyle. The financial sector has a massive responsibility to protect consumer records as they are the custodians of their funds.




Why You Need Cyber Security And What It Costs – Charles Leaver

Published by:

Written By Charles Leaver Ziften CEO

Almost all organizations realize that they have to purchase cyber security but they are never ever sure what they need to invest or why they should be spending. The notion that they might face a cyber attack on one of their servers and have delicate info taken is something that every organization needs to contend with, however what type of attack the hacker would use and how the organization can defend itself is not so clear.

The bottom line is that total digital defense is difficult to attain, and any coverage of cyber attacks in the media never ever provides detailed information of how the attack happened. If this info was to be shared by the media then it might set off copy cat cyber attacks. At the same time, media coverage of cyber attacks tends to exclude some essential information such as that many data theft occurs by discovering a way past a login page and not through getting past all of the computer network security defenses.

Endpoint threat detection and response systems are so vital to an organization since it offers details about cyber attacks as they are happening, which then offers the company a chance to fend off the invasion. This is in contrast to previous endpoint threat response systems which was only able to respond after the event. They were more like a brick wall that a hacker could navigate in time. The brand-new endpoint systems prevent cyber bad guys from being able to produce an attack on a simulation of a network utilizing servers at home and then duplicate this to attack an organization’s network. The new endpoint systems constantly monitor and provide a human intelligence option that can remove hackers from the network and repair any damage to files that have been jeopardized.


There Is Such A Requirement For This Software Today


The financial losses that an organization can deal with if they do not use the right cyber security are significant. Some organizations are at the greatest risk because they do not utilize cyber security at all. There is a general rule that states if a company employs 50 individuals then they must spending plan $57,600 per annum for cyber security. If the organization is larger then this would increase proportionally, according to Businessweek. A lot of companies are under buying cyber security since they do not fully comprehend the implications of data theft and how it can cost them millions of dollars without including the intangible costs of staining the reputation of the organization.

The best financial investment a company can make in cyber security is to encrypt all communication lines and implement antivirus, anti malware and a state of the art endpoint threat detection and response system. These are the essential aspects for creating a security system that is capable of defending against a variety of hazards. If a company does not utilize a mix of security systems then they can be caught unaware with a cyber attack they had not thought of. It is crucial that all areas of cyber security are taken into consideration when constructing a network defense and all delicate data should be kept on servers and not on individual hard drives. It holds true that there are many ways that the network of an organization can be infiltrated, and making preparations for these can assist companies to make the modifications that they have to. The security of an organization’s network is probably the most critical element for the safe keeping of data. When you execute an enclosed, cyber protected network it will allow administrators to let their staff members work easily.





Prevent Data Breaches And Legal Problems By Tightening Up Your Security – Charles Leaver

Published by:

Charles Leaver Ziften Chief Executive Officer writes

Most companies require no reminder that the threat of a cyber attack is extremely real and might do some severe damage to them; work is happening with the lawmakers to create data breach notice laws that are more comprehensive. This highlights that companies really have to execute more powerful security measures and protect their data from being taken. Organizations need to take responsibility and develop a system that will safeguard them from the hazard of cyber attacks, they need to notify their staff members, implement cutting edge endpoint detection and response systems, and make sure that any delicate data on servers is encrypted. The general public have actually become more security conscious and they are keeping a careful eye on organizations so this is another reason why every organization should secure itself from cyber attacks.

There is interest in standardizing the data breach laws even from companies that have actually been infiltrated already. The Hill specifies that there is “a general consensus that federal requirements are required on data breach notifications.” This is important as at the moment a lot of organizations are revealing data breaches without having the ability to follow a basic process. Without this process there is an incentive for companies to hide the breach or under report the impact that it has had so that they can remain competitive.


Stopping A Cyber Attack


Organizations can utilize various techniques to maintain the privacy of their data. 5W Public Relations PR Executive, Ronn Torossian, has put together a list of actions that organizations can carry out to avoid cyber attacks. The list just has a couple of basic guidelines, and this includes the execution of cutting-edge endpoint detection and response systems. The other key points are the use of encryption and the routine modification of passwords. These are certainly a good starting point however what about the most recent cyber attack prevention technology?

All organizations should be utilizing file encryption, anti malware and anti virus scanning and install a endpoint threat detection and response software application and a firewall. This is an extremely powerful combination and will make a network about as protected as is possible. Utilizing a mix of security approaches will supply a much greater level of defense than any single security procedure could. This does not indicate that any single technique is weak, but various tools carry out various security tasks.

The workers of the organization must be educated to keep modifying passwords which is simply one (however an important) element of a total security strategy. These passwords need to be strong as well. The use of alphanumerics and unique characters as well as long passwords should be encouraged. Password security is important for staff members dealing with delicate data, such as those in the monetary and oil and gas markets, as worker login portals need to be completely protected from hackers. Other security gadgets such as optical scanners can be installed in safe areas to minimize the chance of an external attack. This is a huge decision for organizations and choosing the best way to make everything safe and secure can be difficult and it can even involve trial and error.




Charles Leaver – Identity Fraud Numbers Very Disturbing And Malware On The Increase

Published by:

This post written by Charles Leaver, CEO Ziften Technologies.

In a report it was revealed that breaches of customer data implies that there are more and more identity thefts being carried out nowadays. This is very disconcerting for all of us.

The report was performed by the National Consumers League and it reveals that in the year 2013, around 33% of consumer data breaches resulted in identity fraud, and this means that the statistic has tripled since the year 2010. This concerning rise can be explained by some clear factors. Cyber wrongdoers are utilizing far more sophisticated methods now and there is a lack of cyber attack laws that force companies to reveal when they have had an attack. To make matters even worse there are very few companies using endpoint detection and response systems to protect their data. All this means that we are going into an environment where consumers are discovering that their data is continuously under attack by deceitful hackers.

John Breyault, who belongs to the National Consumers League, stated that cyber attack breach legislation like the one operating in California can help with the reduction of breach reverberations by mandating the companies that have been breached to quickly get the word out.

He went on to say that after a breach prompt notification is needed so that individuals can conduct a “harm analysis” once they understand about an attack. This is everybody’s right and at the moment the kind of issue that would set a notice in motion remains really broad.

Sadly, it is not just identification theft that is under the spotlight. A different report highlighted that malware is now more common than it ever was.


Every Third Computer Has A Malware Infection Revealed In A Report


The Anti Phishing Workers Group published a report stating that malware was most likely to be present in as much as a 3rd of the computers throughout the world by the last quarter of 2013. This is a significant increase when compared with the previous quarter says Tech News World. The technical director of a security lab that examines cyber attacks, Luis Corons, said that new malware strains are being developed at an extremely rapid pace and that malware infections might increase even further.

He mentioned that the creation of new malware samples has actually just escalated and it has doubled from the last quarter of 2013 to the very first quarter of 2014.

The findings of these two reports highlights that there is no space for complacency in organizations when it pertains to security. Every company has to sure up its endpoint detection and response systems or deal with the fact that a cyber attack is increasingly more likely to be coming their way.







Charles Leaver