〈   Technology and Protection
Solutions and technologies geared to SMEs

Chapter 1.1

Attack scenarios and protection tools


While the tools chosen play a key role in ensuring effective protection, it is important to think about attack scenarios rather than tools. A tool that is not aligned with the relevant attack scenario will not yield the anticipated results.

You should therefore try to determine which types of attack scenarios are priority when it comes to protection.

  • Data theft
  • Cryptolockers/ransomware
  • Exploitation of a vulnerability
  • DoS
  • Human error
  • Theft of credentials/passwords
  • Inappropriate behaviour
  • Social engineering

2023 © Trust Valley. All rights reserved.