Attack Surface

3rd January 2020 | Cybrary Attack Surface
The Attack Surface in cyber security is the sum of all of the points, or “attack vectors” where a hacker can try and input data into or take out data from an environment. Keeping the attack surface as small as possible is the best cyber security tactic. Related Term: Moving Target Defense Source: Open Web Application Security Project

What does this mean for SMB’s?

SMB owners should implement the Top 10 protections recommended in CyberHoot’s Blog article to reduce their attack surface as much as possible.  By putting these items in place you are not guaranteeing you can eliminate all security incidents, but you are making your organization much harder to hack.  In a physical world these recommendations are the equivalent of Guard dogs, spot lights, locks on all your windows and doors, and armed security details parading through your yard.  Sure you could be attacked, but there are many other easier targets for hackers to go after.

To learn more about reducing an attack surface, watch this short video:

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Let’s be honest, who hasn’t reset a password at least once this month? For decades, passwords have been our...

Read more
When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more
Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...

Read more