Compromise

The theft of, or otherwise unauthorised disclosure, modification, substitution, or use of sensitive data.

Example: Your account / login credentials have been stolen, perhaps through phishing or malware, and used to gain unauthorised access to your data. Such access could then be used by the cybercriminal to exfiltrate (steal) your organisation’s data, before then triggering a Ransomware payload

Facebook
Twitter
LinkedIn

Thank you!

Thank you for signing up to our newsletter.