Enabling customers to secure their corporate assets while easily moving to the cloud has always been at the forefront of Preempt’s mission. While Preempt shines in preventing network threats with our unique detection capabilities, such as our ability to detect NTLM relay attacks in real-time, our goal has always been to bring these advanced threat detection and prevention capabilities to the cloud.
Think about this statement: “Half of the people you know are below average.” In simple terms, it means that statistically most of the people you know are considered to have average intelligence, or just below or above the line. Does this mean they are dangerous? Does it mean you should reconsider your friendship? Let’s not jump to conclusions just yet.
Enterprises almost always have users, accounts or processes that run critical business operations to enable smooth operations and ensure productivity. Often, there is a lot of emphasis placed on security, availability and integrity. Regardless of the checks and balances, systems are not infallible. Sometimes this is done because it is perceived to be secured trusted operations, and sometimes it’s based on a planned calculated risk management.
When Mark Zuckerberg’s passwords were hacked from his twitter and other accounts, that news got everyone’s attention . Online articles suggest that hackers got his password from the 2012 LinkedIn breach where 117 million accounts compromised. Mr Zuckerberg reused his passwords on other services, like Twitter, which got compromised.
This incident along with many other similar hacks proves that cyber-attacks are not isolated events, they are like a giant wave with long-term effects that can set off a chain of events.