top of page

Cyber attack methods explained, with a twist!

  • Writer: Neil Hare-Brown
    Neil Hare-Brown
  • Apr 6, 2023
  • 1 min read

Updated: Aug 12


ree

Learn about the ways in which cyber criminals attack businesses, using Arthurian legend analogies.


STORM Guidance have put together an interactive presentation outlining the methods cyber criminals use to compromise businesses. To keep things interesting, we're using analogies from Arthurian legend as a general theme.


Methods covered

In this presentation we cover the key methods of attack, including:

  • Ransomware

  • Remote Access Trojans (RAT)

  • Advanced Persistent Threats (APT)

  • Distributed Denial of Service (DDoS)

  • Business Email Compromise (BEC)

  • Phishing

Interactive presentation

Check out the presentation below:




Note: This is best viewed on a desktop. For a fuller experience, set your browser to full screen.



Speak with a cybersecurity specialist

Contact the team at STORM Guidance:

UK/Europe: +44-203-693-7480

Africa: +230-434-1277

India: +91-20-68317014

USA: +1-703-232-9015

Your contact details will only be used in connection with this enquiry.

Please read our Privacy Policy.

I'm enquiring as
bottom of page