The Cyber Source blog

Cyber Security, in plain English

INFOGRAPHIC: Hacker Personas - Inside the mind of a cyber criminal

Infographic-blog-header-Cyber-source-NOC-knowhow

Do you know who would be most likely to hack your information system?  It’s quite possible you’ve never even thought of it.

Determined attackers are constantly finding new methods to outwit traditional security systems, using an arsenal of techniques to attack from every angle.

There are many different types of attackers, each with their own reasons for doing what they do. Knowing who is behind your threats and what their motivations are, can help you implement security measure to put them on the defence. 

Read the full article ››

014_Hacker Personas Infographic v3-FINAL

Download Infographic

Back to blog article ››


Why do hacker personas matter?

Building hacker profiles helps us to identify what the likely targets are going to be, how skilled they are, and what kind of defences we need in order to protect ourselves. The greater the accuracy and completeness of the persona, the better chance we have of stopping them.

 

CIO's Guide to Cyber Security Improvement


Further reading

 


About Comtact Ltd.

Comtact Ltd. is a government-approved Cyber Security and IT Managed Service Provider, supporting clients 24/7 from our ISO27001-accredited UK Security Operations Centre (SOC).

Located at the heart of a high security, controlled-access Tier 3 data centre, Comtact's state-of-the-art UK Cyber Defence Centre (SOC) targets, hunts & disrupts hacker behaviour, as part of a multi-layered security defence, to help secure some of the UK's leading organisations.

Explore our 24/7 Security Operations Centre (SOC)

SHARE THIS STORY | |

Sign-up for weekly updates

Recent Posts

Recent Posts