top of page
  • Neil HB

Cyber attack methods explained, with a twist!



Learn about the ways in which cyber criminals attack businesses, using Arthurian legend analogies.


STORM Guidance have put together an interactive presentation outlining the methods cyber criminals use to compromise businesses. To keep things interesting, we're using analogies from Arthurian legend as a general theme.


Methods covered

In this presentation we cover the key methods of attack, including:

  • Ransomware

  • Remote Access Trojans (RAT)

  • Advanced Persistent Threats (APT)

  • Distributed Denial of Service (DDoS)

  • Business Email Compromise (BEC)

  • Phishing

 

Interactive presentation

Check out the presentation below:




 

Note: This is best viewed on a desktop. For a fuller experience, set your browser to full screen.



Subscribe to STORM
cyber security insights

Stay informed on the latest trends in digital security, cyber insurance, incident response and more with our industry leading insights, blog and webinars.

bottom of page