Follow us on our LinkedIn company page   Follow us
Resize font  
Call us now on 0845 600 4403
 Cyber Incident Helpline +44 (0)1454 451801

Understanding the Threat

What is the cyber threat and how can it affect my company?

The cyber threat is often dramatized and reported in a way that is difficult to conceptualize.  As with all threats, it is essential that our clients understand from what, and from where, they are at risk. PGI’s Cyber Intelligence reporting provides bespoke, tailored products that allow our clients to respond proportionately, and make balanced, relevant investment decisions to protect themselves.

The core of the cyber-security threat that can be faced by any company, regardless of its size, local footprint or turnover can be brought down to three major components:

  1. Human – People are arguably one of the weakest and easiest links to break in any client’s infrastructure. The social media information outburst, the blurred lines between corporate and home devices and often the lack of policy and procedures around the actions employees are allowed to take, all of these create the opportunity for critical data cracks which attackers are just one step away of utilising to penetrate a system.
  2. Physical – Companies can be physically reached relatively easy nowadays given the fact that businesses have multiple offices across the world with varying levels of security. If you add that to a the vast amount of data available on the internet of building locations, architectural drawings, street view and internal pictures of equipment, a rich multidimensional picture is born, offering attackers just about everything they need to plan their next move.
  3. Technical – Companies often have disparate or ageing legacy infrastructure connected to the internet across the business, as well as a variety of interlocutors linked to their internal system. This could open the way for cyber-attacks via third party entry points to a network, such as corporate, wireless, access control, CCTV, building management, VOIP and Video Conferencing, to name but a few.

Although apparently divergent, the three domains of the cyber threat can be easily blended preliminary to a multi-level attack. Once you become aware of the critical information that is on display for cyber-criminals to make use of, you have already made the first step to understanding and therefore being able to protect your organization.

At PGI, we monitor the cyber threat to identify instances of attack planning and network breaches, key indicators of targeted systems or individuals, as well as prospective vulnerabilities, all to give you the invaluable advanced warning that can save you millions in resources and reputation.

Call us now

Call us now to discuss your requirements with one of our consultants.