Slovak national Computer Emergency Response Team.
  • Contacts
  • Report an incident
  • Text version
  • Graphic version
  • Slovenčina
www.nbu.gov.sk   www.slovensko.sk
  • About Us
  • Services
  • Statistics
  • Publications
  • Tips and Tricks
  • Legislation
  • Tips and Tricks
  • Responsible Vulnerability Disclosure Guideline
  • Security of Operational Technology Systems
    • Technological and Functional Difference between IT and OT
    • Myths and Superstitions
    • Concepts and Standards for Cybersecurity of OT Systems
    • Recommendations for Energy Sector
    • Frequently Asked Questions
  • When to Contact Us
  • Report an Incident
  • Security Recommendations
    • Online Safety Basics
      • What to Do if You Are a Victim
      • Spam
      • Phishing
      • Malicious E-mail
      • Spam and Phishing on Social Networks
      • Tips for Avoiding Being a Victim
    • Securing Accounts and Devices
      • Passwords and Securing Your Accounts
      • Hacked Accounts
      • Social Media Platforms
      • Securing Your Home Network
    • Data Backup
      • Cloud
    • Privacy Protection
      • Tips to Manage Your Privacy
    • Online Shopping
      • Shopping on the Go
      • Online Shopping Tips
      • Basic Safety and Security Tips
    • Mobile Devices
    • Malware and Botnets
      • Botnets
      • Ransomware
      • Spyware
      • Virus
      • Protection against Malware
    • Identity Theft, Fraud and Cybercrime
      • Identity Theft and Fraud
      • Cyberbullying and Harassment
  • Business Organizations
    • Asset Identification
    • Asset Protection
    • Incident Detection
    • Incident Response
    • Recovery
  • Teens
    • Tips for Teens
    • Tips for Parents
    • Parental Controls
  • Seniors
    • Tips for Seniors

Incident Detection

Detection is all about knowing when something has gone wrong. We have fire alarms in our businesses and homes that alert us to problems. In cybersecurity, the faster you know about an incident, the quicker you can mitigate the impact and get back to normal operations.

Detection is about:

  • Knowing the threats applicable to your business
  • Having cybersecurity products or services that help monitor your networks
  • Having well-trained employees who can spot things that aren’t right and report them
  • In some cases, phishing attacks using your brand, even having your customers alert you when cybercriminals are trying to gain access to your system via customer credentials.

Knowing the Threats

Not all threats in cybersecurity equally impact your business. Some, like broad ransomware attacks are designed to infect any system anywhere that is vulnerable. In other cases, attacks may be motivated by the type of business your are in and the value of what you have. For example, if your are in the retail business cybercriminals may be looking to steal customer payment data or access a bank account. If you are in manufacturing, maybe stealing your intellectual property or disrupting your operations is the goal.

You don’t need to be a cybersecurity expert to ensure that your business is protected, but it is critical that you understand the online threats to your company’s network. Awareness of key threats will enable you to employ practices and behaviors that limit your company’s risk.

(Author: National Cyber Security Alliance, published under Public License)

First publication 02. 3. 2018. Last update 02. 3. 2018 13:28
Current threats
Current threats

SK-CERT Bezpečnostné varovanie V20250422-02

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 10.0 Identifikátor knižnica Erlang/OTP SSH – kritická ...22. April 2025

SK-CERT Bezpečnostné varovanie V20250422-01

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 9.8 Identifikátor knižnica PyTorch – kritická bezpečnostná ...22. April 2025

SK-CERT Bezpečnostné varovanie V20250417-03

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 9.8 Identifikátor Siemens TeleControl Server Basic – ...17. April 2025
all publications
CVEs
Tweets by sk_cert
Links
Links
  • ENISA
  • CERT
  • Trusted Introducer
  • FIRST
Copyright © 2025 All rights reserved - Last update 15. 05. 2025 10:58
  • Sitemap
  • Declaration of accessibility
  • Technical support
  • Content
  • Contacts
  • Report an incident
  • RSS