Compromise

The theft of, or otherwise unauthorised disclosure, modification, substitution, or use of sensitive data.

Example: Your account / login credentials have been stolen, perhaps through phishing or malware, and used to gain unauthorised access to your data. Such access could then be used by the cybercriminal to exfiltrate (steal) your organisation’s data, before then triggering a Ransomware payload

Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn

Thank you!

Thank you for signing up to our newsletter.