Pick 3 Indiana companies, explore their website, and determine: Threat/Vulnerability/Threat Action What Vulnerability mitigation techniques can be used for your companies?
Pick 3 Indiana companies, explore their website, and determine:
Threat/Vulnerability/Threat Action
What Vulnerability mitigation techniques can be used for your companies?
Trending now
This is a popular solution!
Step by step
Solved in 3 steps
-
Eli Lilly and Company
-
Threat: Phishing attacks are a significant threat to pharmaceutical companies like Eli Lilly. Cybercriminals may attempt to impersonate the company to steal sensitive research or personal information.
-
Vulnerability: Employees may inadvertently fall victim to phishing emails, clicking on malicious links or downloading harmful attachments.
-
Threat Action: Cybercriminals send convincing-looking emails that appear to be from trusted sources, tricking employees into revealing sensitive information.
-
Vulnerability Mitigation Techniques:
- Employee Training: Regular training and awareness programs can educate employees about the dangers of phishing and how to recognize phishing attempts.
- Email Filtering: Implement advanced email filtering systems to identify and quarantine phishing emails before they reach employee inboxes.
- Multi-Factor Authentication (MFA): Require MFA for accessing sensitive systems and data to prevent unauthorized access.
-
-
Cummins Inc.
-
Threat: Industrial espionage and cyber-attacks are a concern for manufacturing companies like Cummins. Competitors or nation-states may attempt to steal intellectual property or disrupt operations.
-
Vulnerability: Vulnerable endpoints or unpatched systems within Cummins' network could be exploited to gain unauthorized access.
-
Threat Action: Attackers may employ malware or social engineering tactics to compromise endpoints and gain access to sensitive data.
-
Vulnerability Mitigation Techniques:
- Regular Patch Management: Ensure all software and systems are up-to-date with the latest security patches.
- Network Segmentation: Isolate critical systems from less critical ones to limit lateral movement for attackers.
- Intrusion Detection Systems (IDS): Deploy IDS to detect and respond to suspicious activities within the network.
-
-
Anthem, Inc.
-
Threat: Healthcare companies like Anthem are prime targets for data breaches due to the wealth of sensitive patient data they hold.
-
Vulnerability: Weaknesses in Anthem's data storage and access control systems could lead to unauthorized data access.
-
Threat Action: Attackers may attempt to infiltrate the network to steal medical records or commit identity theft.
-
Vulnerability Mitigation Techniques:
- Data Encryption: Encrypt sensitive data both in transit and at rest to protect it from unauthorized access.
- Access Control: Implement strict access controls and role-based permissions to limit who can access sensitive data.
- Regular Security Audits: Conduct regular security audits and penetration testing to identify and address vulnerabilities proactively.
-
Could you please provide websites links for three websites? thank you