Select Page

In today’s security landscape, cyber security threats to businesses are becoming more sophisticated than ever. Hackers are developing tools that allow them to easily gain basic access to your data and files, through phishing attacks, malware infections, and ransomware.  Through scanning thousands of computers at a time hackers are able to target their victims using software and tools to gain higher privileges and access not only to the infected computer but between devices within the network.  This technique is called “Lateral movement” which is a technique used by hackers  to systematically move through a network in search of accessing the crown jewels.  Sometimes these hackers will take months to work their way through the network to gain access to extract the information they need.  Watch as Ken and Michael go over how you can protect yourself and your clients from lateral movement.