Threat Advisory Service

SecureData’s standalone Threat Advisory Service arms you with expert insights into the most relevant and serious cyber risks on the horizon in an easy-to-digest visual format, enabling you to eliminate critical vulnerabilities before they impact your business.

You can’t keep pace with today’s crowded and ever-changing threat landscape alone. Our expert analysts constantly monitor evolving risks to sift out the one threat in ten thousand that poses a real and present danger to your business.

We never bombard you with irrelevant information: all our Threat Advisories are tailored to your particular industry, IT estate and security posture. We then go even further: advising you in clear and simple terms on the right actions to take to mitigate the risk and resolve crucial vulnerabilities.

Each SecureData Threat Advisory includes:

Click on any of the sections above for more detail.

Headline: the threat at a glance

1
2
3
4

 

This upfront summary can be absorbed immediately, rapidly showing anyone in your organisation what the threat affects, its severity and the urgency of a response.

  1. Threat Name

    If there’s a public name for the threat, it will be displayed here.

  2. Affects

    The product or platform that the threat targets.

  3. Severity Rating

    The risk that a successful exploit poses to your business.

  4. Response Time

    How urgently your business should take action.

Benefits:

  • Understand the importance of a new threat at a glance
  • See only the relevant risks to your IT estate from today’s crowded threat landscape
  • Proactively assess threats “in the wild” before they impact your business
  • Avoid wasting time on irrelevant or unimportant risks
« Back to overview

High Level Summary

A clear and concise briefing on the risk. From what the threat targets, to how attacks progress and its expected impact, this section outlines the facts in plain terms and doesn’t demand a deep understanding of IT security.

Benefits:

  • Rapidly confirm if your business must address this threat
  • Easily prioritise remediation
  • Communicate the threat more effectively to colleagues and superiors

« Back to overview

Triage Chart

This section breaks down which components of your IT estate are vulnerable to the threat in one simple, easy-to-absorb visualisation.

Relevant technologies, processes and controls are presented in colour-coded bubbles to show those targeted by the threat, those unaffected and those that can or cannot limit its impact. Alongside this colour-coding, the relative size of the bubbles clearly reveals which areas are most important.

Benefits:

  • Understand the crucial vulnerabilities in your IT estate at a glance
  • Immediately see which technologies, processes and controls can limit the threat
  • Communicate the threat more effectively to colleagues and superiors

« Back to overview

The Threat in Detail

Unlike other commercial threat feeds, our Threat Advisories go far beyond simply informing you of generic risks. We don’t just tell you something bad may happen: we harness the knowledge and experience the world’s best security analysts to tell you how you prevent it.

After the earlier sections have confirmed that this threat needs to be addressed by your business, this part of the report arms you with the detailed information you need to respond appropriately with an immediate, contextualised action plan.

We breakdown the threat’s attack path in detail and assess the severity of the risk based on a range of factors such as the likelihood of exposure, the relevance to your IT estate and the ultimate business impact. We then provide clear, actionable advice on how to detect, remediate and prevent the threat from impacting your business. This section also includes any other useful information that can assist in resolving the risk, such as known Indicators of Compromise or threat signatures.

Benefits:

  • Proactively address threats before they impact your business
  • Remediate vulnerabilities more quickly and cost-effectively with clear, actionable insights
  • Change the focus of security from operational fire-fighting to addressing threats strategically

« Back to overview

HOW IT WORKS STEP ONE - OBSERVE DARK WEB THREAT FEEDS DIRECT VENDOR RELATIONSHIPS PUBLIC INFORMATION AFFINITY & GI SENSEPOST 100’S OF THREATS 100’S OF VULNERABILITIES STEP TWO - ORIENTATE 100’S THREATS & VULNERABILITIES PREVIOUS EXPERIENCE GENETIC HERITAGE NEW INTELLIGENCE CULTURAL TRADITIONS SANDBOX ANALYSE &SYNTHESISE SOCIAL & MEDIA TRACKED CAMPAIGNS 1% THREATS STEP THREE - DECIDE DECIDE WHICH THREATS REALLY MATTER VIA A THREAT RISK SCORING MATRIX TAKING INTO ACCOUNT FACTORS INCLUDING SEVERITY DAMAGE REPEATABILITY RESPONSE SCALE SPREADABILITY TO PRODUCE THREAT ADVISORIES THAT ARE RELEVANT WE EMPLOY OUR EXPERIENCE AND JUDGE MEDIA EXPOSURE TARGET VALUE CUSTOMER PROFILING AND ONE THREAT ONE THREAT ADVISORY STEP FOUR - ACT PRODUCE THREAT ADVISORY THREAT OVERVIEW EXECUTIVE SUMMARY ATTACK METHOD SEVERITY BREAKDOWN DETECTION METHODS REMEDIAL ACTIONS ISSUE THREAT ADVISORY DIRECT TO CUSTOMERS VIA SECUREDATA PORTAL THREAT ADVISORY SERVICE MANAGED SERVICES CUSTOMERS CHANGES RAISED VIA SECUREDATA PORTAL CHANGES MADE AND THREAT NULLIFIED RETURN TO STEP ONE