Tag: UNAPEN ITComplete

June 22, 2016

Like lions picking off the weakest gazelles in a herd, hackers are compromising weak systems in order to obtain passwords and then using those passwords in an attempt to access more secure systems.
Ken Rode, Dir of IT Services at UNAPEN, explains how these multi-stage cyber attacks are structured and the top 3 ways to prevent them from happening to your business.