The Motley Fool Discussion Boards

Previous Page



Subject:  LizRyan Date:  11/12/2018  11:33 PM
Author:  LizRyan Number:  25 of 157

Improving Your Online Security
The internet is an area that people usually don’t think much about. As the internet becomes a more and more widely used platform, there will also be more people looking to use this to exploit other people for their own gain. You would need to know the different types of hackers and the things to consider for your cyber security risk.
Different types of hackers and what they could mean for your business
Black Hat-Their target varies but usually they target your money or confidential data.
White Hat- They are the ones you can trust to find those weaknesses and protect your business.
Grey Hat- These kinds of hackers don’t really have anything harmful in mind. They break into systems for personal enjoyment and not for anything like stealing.
Blue Hat- These are the hackers who have it out for revenge. They usually use existing malwares and modify it to target specific people they don’t like.
Green Hat- This is the baby hackers. They don’t really do anything malicious since they’re still learning how to hack.
Red Hat- They work to stop Black Hat hackers. But you can’t hire them since they work on their own.
Script Kiddie- These hackers don’t really cause any threat to your financial profits but they can cause annoyance since their usual attacks consist of DoS or DDoS
5 Key Cyber Security Risk Considerations For Board Members
1. Know what you want to protect in your business
Ask yourself and the board members first what they want to protect because each data needs to have separate systems to be protected.
2. Use the perspective of an IT person to understand it better
You should assume the perspective of an IT person or expert. Looking at it in a business manner won’t help since cyber security is a field vastly different from business.
3. Comprehend what exactly you are facing as a threat
First try to understand the attack vectors and threats that your company or organization would face. This would give you a better understanding of how to prepare for them and how to improve the cyber security.
4. Use a Control Framework
Try to create a control framework that consists of risk assessment, threat modeling and attack vectors and threats to help the board members or client understand the risks and threats better.
5. Focus on the Audience
Explain to them instead about the data and profits that are in threat of being lost. Try to communicate using the terms that are related to their department.
Copyright 1996-2019 trademark and the "Fool" logo is a trademark of The Motley Fool, Inc. Contact Us