How to detect & react to cyber incidents
Key information about the most common incidents, based on CIRCL's statistics
The ability to detect suspicious and malicious e-mails is key to combating cyber threats: e-mail is one of the most favourite means of communication of cybercriminals.
The ability to detect suspicious and malicious e-mails is key to combating cyber threats: e-mail is one of the most favourite means of communication of cybercriminals.
Unsolicited or irrelevant e-mail messages sent over the Internet for advertising, phishing, spreading malware, etc.
306.4 billion e-mails were sent and received daily in 2020.
Phishing is a form of cybercrime where cybercriminals obtain personal information such as usernames, passwords, and credit card details from their victims.
Phishing attacks account for more than 80% of reported security incidents.
Malware is the abbreviation for ‘Malicious Software’: any software that is intended to cause harm to your system or network. 94% of malware is delivered via e-mail.
No matter how careful we are, our computer may become infected. How to detect it and what to do once the problem happened?
No matter how careful we are, our computer may become infected. How to detect it and what to do once the problem happened?
Before performing a reinstall:
Your data is compromised if your data is accessed, copied, modified, damaged, destroyed, deleted, distributed or transmitted by a third party in any way.
Your data is compromised if your data is accessed, copied, modified, damaged, destroyed, deleted, distributed or transmitted by a third party in any way.
Make sure to never use the same password for multiple accounts: if one service you use is breached, you should consider all the accounts using the same password as compromised.
A distributed denial-of-service (DDoS) attack is a cyberattack to disrupt the normal traffic of a targeted server, service or network by overwhelming the target IT infrastructure with a flood of Internet traffic.
A distributed denial-of-service (DDoS) attack is a cyberattack to disrupt the normal traffic of a targeted server, service or network by overwhelming the target IT infrastructure with a flood of Internet traffic.
content2
content2
An incident is any adverse event whereby some aspect of security could be threatened.
IT security policies aim to address security threats and implement strategies to reduce IT security vulnerabilities. All employees must be familiar with and comply with the content of this document.
SECURITYMADEIN.LU’s mission is to help companies and organisations of all sizes grow their cybersecurity maturity. The agency’s three departments provide extensive guidance from awareness to cyber incident management. Gaining experience plays a key role in adopting the right reflexes. See all our training here.