Skip to main Content
White Paper

White Paper: Effective protection in all phases of a cyber attack with Microsoft 365 Defender

Global Knowledge
  • Date: 15 December, 2021

Abstract:

Introduction

Change is a constant in the never-ending arms race between hackers and cybersecurity
experts. Attacks have become more complex, common and creative, posing new challenges and
requiring better tools to tackle familiar and newly emerging threats.

While the specifics of individual attacks can vary, it is possible to identify certain patterns and
phases that apply to most cyber attacks. They generally follow the following stages:


• The reconnaissance phase. The attacker identifies a vulnerable target and figures out how to
exploit it.


• The weaponisation phase. The hacker uses the previously gathered information to find and
create ways that allow him/her to get into the target’s network. Spear phishing mails or
whaling attacks are prime examples.


• The delivery phase. Phishing mails are sent and/or ‘watering hole’ web pages are posted on
the internet.


• In the exploitation phase, the attacker starts to reap the rewards of his/her attack by
attaining passwords and usernames and infiltrating deeper into the network and IT
infrastructure of the victim

To download the entire White Paper for free, please complete the 30 second form below.

Browse Related Brands:
Browse Related Topics:

White Paper Form.

Complete the form below and you'll be able to download the white paper immediately

Required*

Please enter a first name

Please enter a last name

Please enter a valid email address

There has been a technical issue with the submission of your form. Please try and reload the browser and try again. If the problem persists please contact the site administrator

Thank you for submitting the form

See below.

Download the White Paper Here


Cookie Control toggle icon