Anatomy of a cyber-attack
Enable HoxHunt to stop infection
PreparationThe attacker gathers all necessary information that is useful for an attack. The better the information, the higher the likelihood is for an employee not be able to spot it. Employees rarely understand what sort of information they are exposing about themselves.
IntrusionDespite heavy technical protection layers the attack reaches the employee. Infection spreads inside the organisation undetected and in silence. At this point the costs of information breach start to rise rapidly.
BreachOn average the attackers spend 213 days in company systems without being detected. Once the breach is detected, it takes 63 days of work to contain an information breach.