Logo: Practical Cybersecurity

Webinar Series

2nd Thursday of Every Month @ 10:30 AM

Next Topic

Why Do We Need MFA?

Providing Solutions That Work Since 2003!

104 1/2 W 9th Ave Suite 500
Winfield, KS 67156

Mon - Thurs 8 am - 5 pm CT
Fri 8 am - 4 pm CT


Is My Network Really Under Attack?

Woman sitting in front of laptop with her head resting on her hand

That’s a good question, isn’t it? Part of what makes the need for cybersecurity so hard to understand is that most of us really can’t “see” cyber attacks taking place against our network. And since many of these attacks are carried out by people far away from our location, we wonder what real damage they can do. But cyberattacks are real, and we need to be prepared for them to happen.

I liken preparing for cyberattacks to the preparations that each of make to care for our home, family, or business. For example, in my home my wife and I have implemented a number of procedures and processes to keep our family safe. I’ve got locks on my doors and windows to keep intruders out. There’s a peep hole in our front door so we can see who is on the other side. When our kids were little we practiced fire evacuation procedures. I’ve got important documents secured against fire, flood, or theft by storing copies in the bank safe deposit box. And finally, my insurance policy allows my family to recover in the event of catastrophe.

I encourage businesses and organizations to take a similar view of the need for cybersecurity. Cyber attacks take place all the time, so we need to make appropriate preparations. We need to put virtual ‘locks’ on our networks to keep intruders out. We need to implement systems to ‘see’ who is trying to attack and what they are trying to do. Plans and procedures should be in place in the event of cyberattack. Having good data protection plans is important so that our data is preserved. And instituting insurance to allow recovery in the event of a cyber catastrophe is a necessary consideration.

Below are maps that will help you ‘see’ cyberattacks going on around the world in real time. As you look at these maps, remember that these same type of attacks are going on against your network right now.

The Digital Attack Map is created by Google. It only highlights the top 2% of reported denial of service attacks going on in the world right now! I liken this type of attack to taking a sledgehammer to a door. These are often a brute-force type of attack.

The Kaspersky Cyberthreat Map is sponsored by the Kaspersky antivirus people. It shows, in real time, the discovery of viruses and malware around the world. Don’t be fooled by the appearance of less malware discovery in the United States. Since many people in the US use something other than Kaspersky, it won’t show as much activity in the US. Believe me, there’s lots of malware in the United States.

Feel free to contact us if we can help you improve your cybersecurity stance.

Practical Cybersecurity Webinar Series

Learn practical information your business or organization can put to use to improve your cybersecurity stance with the short, monthly webinars.

  • Preparing for Ransomware
  • What’s a Firewall? Why Does It Matter?
  • Why Do We Need MFA?
  • What Does Cyber Insurance Expect of Me?
  • What Happens If My Laptop or Phone Is Stolen?
  • Backup Planning

Registration is FREE!


You might also be interested in...