How to Protect your systems from APT Attacks

apt2

In my last post I talked at length about Advanced Persistent Threat (APT) attacks; what they are, how they work as they remain undetected in your network all the while mining your organization’s sensitive information, and several key indicators that your company may be experiencing an advanced persistent threat attack. Now that you are armed with that information, I feel obligated to share another part of this troubling kind of attacks, namely, how to prevent them. In other words, how do you keep your…

Read more