Message Font: Serif | Sans-Serif
No. of Recommendations: 0
Improving Your Online Security
The internet is an area that people usually don’t think much about. As the internet becomes a more and more widely used platform, there will also be more people looking to use this to exploit other people for their own gain. You would need to know the different types of hackers and the things to consider for your cyber security risk.
Different types of hackers and what they could mean for your business
Black Hat-Their target varies but usually they target your money or confidential data.
White Hat- They are the ones you can trust to find those weaknesses and protect your business.
Grey Hat- These kinds of hackers don’t really have anything harmful in mind. They break into systems for personal enjoyment and not for anything like stealing.
Blue Hat- These are the hackers who have it out for revenge. They usually use existing malwares and modify it to target specific people they don’t like.
Green Hat- This is the baby hackers. They don’t really do anything malicious since they’re still learning how to hack.
Red Hat- They work to stop Black Hat hackers. But you can’t hire them since they work on their own.
Script Kiddie- These hackers don’t really cause any threat to your financial profits but they can cause annoyance since their usual attacks consist of DoS or DDoS
5 Key Cyber Security Risk Considerations For Board Members
1. Know what you want to protect in your business
Ask yourself and the board members first what they want to protect because each data needs to have separate systems to be protected.
2. Use the perspective of an IT person to understand it better
You should assume the perspective of an IT person or expert. Looking at it in a business manner won’t help since cyber security is a field vastly different from business.
3. Comprehend what exactly you are facing as a threat
First try to understand the attack vectors and threats that your company or organization would face. This would give you a better understanding of how to prepare for them and how to improve the cyber security.
4. Use a Control Framework
Try to create a control framework that consists of risk assessment, threat modeling and attack vectors and threats to help the board members or client understand the risks and threats better.
5. Focus on the Audience
Explain to them instead about the data and profits that are in threat of being lost. Try to communicate using the terms that are related to their department.
Print the post  


What was Your Dumbest Investment?
Share it with us -- and learn from others' stories of flubs.
When Life Gives You Lemons
We all have had hardships and made poor decisions. The important thing is how we respond and grow. Read the story of a Fool who started from nothing, and looks to gain everything.
Contact Us
Contact Customer Service and other Fool departments here.
Work for Fools?
Winner of the Washingtonian great places to work, and Glassdoor #1 Company to Work For 2015! Have access to all of TMF's online and email products for FREE, and be paid for your contributions to TMF! Click the link and start your Fool career.