Cyber Crime: A Million Dollar Industry

2012 was a banner year for cyber attacks on US Businesses. A sampling of 56 businesses revealed a staggering 102 successful cyber attacks on them a week – 1.8 SUCCESSFUL attacks per business per week. This number is expected to increase in 2013 and on. Cyber crime is here to stay, and will continue to evolve into ever more sophisticated and costly forms. If a company is storing information on your network, mainframes, etc., or is reliant upon the internet for advertising, sales, etc., that company is a target, and if there is no up-to-date security plan in place, a sitting duck.

Typical Cyber Security Threats

  • Malware
    • Viruses
    • Spyware
    • Phishing
    • Spear Phishing
    • Trojans
    • Rootkits
  • Cyber Intrusions
    • Data Breaches
    • Cyber Espionage
    • Data Exfiltration
  • DDoS Attacks
  • Cyber Warfare
  • Hacktivism
  • And More…

GDF’s Systematic Approach to Cyber Security

Since 1993, GDF has been involved in countering over 1,300 Cyber attacks in both the US and abroad. In 2012 alone we prevented and/or remediated 325 full scale attacks for over 120 companies. There is no other cyber security provider with our level of expertise and experience.

We have developed a prevention-inclusive rapid response program that finally addresses both sides of the coin concerning costly data breaches, putting Proactive Breach Prevention Solutions AND lightning fast Crisis Response Teams together under the same roof for your continued success and peace of mind. Best of all, GDF’s vast experience in the digital marketplace enables us to flat rate many projects, making adherence to corporate budgets easier than ever before.

Step 1 – Risk Assessment

It starts with a risk assessment of your organization with an eye on the big picture and gathering the information we need to tailor a program specially suited to your needs. We analyze your IT resources, intellectual property concerns and map your threat landscape. Are there regulatory compliance issues involved? Is litigation anticipated and/or imminent? Have employees been trained in even basic data security fundamentals? Is there a feasible and coherent plan in place should a breach or intrusion occur which can be immediately and effectively implemented to contain the damage? What measures are currently in place? And much more…

E-DEFENSE Strategy

Step 2 – Securing your data

The next step is to design a secure perimeter, as well as a segmented infrastructure, designed to protect critical assets and information targets.

Securing Data

Step 3 – Design and Document a risk management policy

It is essential that everyone involved in managing or accessing digital data be on the same page from a security and response standpoint. A detailed risk management policy that connects the dots and lays out the procedures to be followed for everyone involved is imperative. One of the greatest advantages of choosing GDF to implement an E-DEFENSE program is that we are also experts in incident response, which is essential to meeting regulatory requirements and successfully responding to the inevitable.

Step 4 – Monitoring

Vigilance is a key ingredient to safeguard against data ex-filtration from both insider and outsider threats. By designing a robust monitoring and prevention infrastructure, we help you put that infrastructure in place, allowing your vigilance to be effective and responsive.

Step 5 – Crisis Response

Even the most secure assets can get compromised by new or unknown exploits and attacks, or by a “trusted” user with legitimate access to your data (Wikileaks business model is based on this fact). A solid response plan to stop the leak quickly and respond to affected assets (clients, employees) is critical. Businesses with solid response plans can and do recover from breaches, and they are also the ones prepared to stand up and respond to regulators, their clients and the public.