{"id":9653,"date":"2021-11-30T13:45:44","date_gmt":"2021-11-30T13:45:44","guid":{"rendered":"https:\/\/agency.angelis.si\/?p=9653"},"modified":"2021-12-09T11:06:38","modified_gmt":"2021-12-09T11:06:38","slug":"a-good-defense-is-the-best-attack-against-cyber-threats","status":"publish","type":"post","link":"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/","title":{"rendered":"A good defense is the best attack against cyber threats"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9653\" class=\"elementor elementor-9653\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4f17d00 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4f17d00\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf0ed62\" data-id=\"cf0ed62\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e3b540c elementor-widget elementor-widget-spacer\" data-id=\"e3b540c\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6e30a0f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6e30a0f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5b9e858\" data-id=\"5b9e858\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-57e940c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"57e940c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d61fcdb\" data-id=\"d61fcdb\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8166ea0 elementor-widget elementor-widget-heading\" data-id=\"8166ea0\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Don't wait idly for the cyber attack on your company to happen...\u200b<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7027724 elementor-widget elementor-widget-text-editor\" data-id=\"7027724\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The latest research predicts that the damage from cyber-attacks will rise to over $ 6 trillion by the end of 2021. It is no surprise then, that companies are frantically investing in the security of their IT infrastructures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2cbc2bb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2cbc2bb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d33ceb1\" data-id=\"d33ceb1\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10e0e1d elementor-widget elementor-widget-text-editor\" data-id=\"10e0e1d\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An efficient IT infrastructure needs multiple layers of security systems that work together to protect the data. In practice, this means that all antivirus, antispyware, firewall, and password and access management applications must operate as a unit. Threats are disguised in various images, malware, virus, phishing, MitM, or so called &#8220;zero-day&#8221; attacks that invade the system during a security system upgrade. Daily maintenance of IT infrastructure is a time-consuming task where one should take no shortcuts. \u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2a887fd\" data-id=\"2a887fd\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-34828a1 elementor-widget elementor-widget-text-editor\" data-id=\"34828a1\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our cyber security experts from ANGELIS d.o.o. will help you establish the first and last defense of confidential information.\u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fba7ce3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fba7ce3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-641c929\" data-id=\"641c929\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3cf7a74 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3cf7a74\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-ef76ff6\" data-id=\"ef76ff6\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e41a886 elementor-widget elementor-widget-heading\" data-id=\"e41a886\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Detect vulnerabilities and shortcomings early\u200b<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-97f59f3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"97f59f3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-4a72e87\" data-id=\"4a72e87\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5496491 elementor-widget elementor-widget-text-editor\" data-id=\"5496491\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The primary responsibility of every IT security engineer is testing for system weakness to evaluate, reduce, and report potential vulnerabilities. To do this, a program that makes an inventory of all network connected devices is required. An external network scan checks for vulnerabilities in an open firewall door. The internal overview collects data on installed operating systems and applications including the number of open ports and user accounts. After the inventory is completed, each device is checked with a known vulnerabilities database, highlighting which devices are exposed. \u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0c9078a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0c9078a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7fab1a9\" data-id=\"7fab1a9\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2513dc9 elementor-widget elementor-widget-image\" data-id=\"2513dc9\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"769\" src=\"https:\/\/static.angelis.si\/uploads\/2021\/11\/cyber-security-cybercrime-cyberspace-hacking-h-2021-08-30-07-39-05-utc-1024x769.jpg\" class=\"attachment-large size-large wp-image-11261\" alt=\"\" srcset=\"https:\/\/static.angelis.si\/uploads\/2021\/11\/cyber-security-cybercrime-cyberspace-hacking-h-2021-08-30-07-39-05-utc-1024x769.jpg 1024w, https:\/\/static.angelis.si\/uploads\/2021\/11\/cyber-security-cybercrime-cyberspace-hacking-h-2021-08-30-07-39-05-utc-300x225.jpg 300w, https:\/\/static.angelis.si\/uploads\/2021\/11\/cyber-security-cybercrime-cyberspace-hacking-h-2021-08-30-07-39-05-utc-768x576.jpg 768w, https:\/\/static.angelis.si\/uploads\/2021\/11\/cyber-security-cybercrime-cyberspace-hacking-h-2021-08-30-07-39-05-utc-1536x1153.jpg 1536w, https:\/\/static.angelis.si\/uploads\/2021\/11\/cyber-security-cybercrime-cyberspace-hacking-h-2021-08-30-07-39-05-utc-2048x1537.jpg 2048w, https:\/\/static.angelis.si\/uploads\/2021\/11\/cyber-security-cybercrime-cyberspace-hacking-h-2021-08-30-07-39-05-utc-440x330.jpg 440w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-13980cc\" data-id=\"13980cc\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9cfcf36 elementor-widget elementor-widget-text-editor\" data-id=\"9cfcf36\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Vulnerability detection is executed in four stages:<\/strong><\/p><ol><li><span style=\"font-size: 16px; letter-spacing: 0px;\"><em><strong>Vulnerability identification<\/strong><\/em> &#8211; The scan can be performed automatically when a new device is installed or by using timers to set scheduled scan in advance.\u00a0<\/span><\/li><li><span style=\"font-size: 16px; letter-spacing: 0px;\"><em><strong>Risk assessment<\/strong><\/em> &#8211; determines the priority and severity of vulnerabilities and possible solutions for their elimination.<\/span><\/li><li><span style=\"font-size: 16px; letter-spacing: 0px;\"><em><strong>Addressing known vulnerabilities<\/strong><\/em> &#8211; Upon completing the assessment, the engineer decides to repair and patch the holes or turn off the vulnerable device. In cases of low threat level, the security team may choose to accept\/tolerate the existence of a vulnerability.<\/span><\/li><li><span style=\"font-size: 16px; letter-spacing: 0px;\"><strong><em>Report on vulnerabilities and countermeasures<\/em><\/strong>.<\/span><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fd409fc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fd409fc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3310289\" data-id=\"3310289\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8bfee08 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8bfee08\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2255673\" data-id=\"2255673\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c56564d elementor-widget elementor-widget-heading\" data-id=\"c56564d\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Offensive cyber security\u200b<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-677df3f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"677df3f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1aff053\" data-id=\"1aff053\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-58bc497 elementor-widget elementor-widget-text-editor\" data-id=\"58bc497\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The pentest or penetration testing is a simulated cyberattack that exposes vulnerabilities in computer systems.<br \/>For example, penetration testing may involve attempting to violate any number of application systems (e.g., application programming interface, frontend\/backend servers) to detect vulnerabilities, such as fields without proper validation that are susceptible to code injection attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1b492e4\" data-id=\"1b492e4\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9e2235c elementor-widget elementor-widget-text-editor\" data-id=\"9e2235c\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The pentest or penetration testing is a simulated cyberattack that exposes vulnerabilities in computer systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-45893b0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"45893b0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d3ab4e9\" data-id=\"d3ab4e9\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-415072b elementor-widget elementor-widget-heading\" data-id=\"415072b\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Approaches of pentesting\u200b<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69ec799 elementor-widget elementor-widget-text-editor\" data-id=\"69ec799\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The penetration test can be performed using three different approaches:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a800ca elementor-widget elementor-widget-text-editor\" data-id=\"0a800ca\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li style=\"list-style-type: none;\"><ol><li style=\"list-style-type: none;\"><ol><li style=\"list-style-type: none;\"><ol><li style=\"list-style-type: none;\"><ol><li><span style=\"font-size: 16px; letter-spacing: 0px;\">The white box approach: The penetration testing team works with the company&#8217;s IT department with unlimited access to internal resources or data they may need during the test.<\/span><\/li><li><span style=\"font-size: 16px; letter-spacing: 0px;\">The gray-box approach: access to internal resources and data is limited. Some employees in the IT department may not be aware of the penetration test to verify their response.<\/span><\/li><li><span style=\"font-size: 16px; letter-spacing: 0px;\">The black-box approach: no access to internal resources. Only certain employees in the company know about the penetration test to check the response of the IT department and detect countermeasures to the attack.<\/span><\/li><\/ol><\/li><\/ol><\/li><\/ol><\/li><\/ol><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6e48367 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6e48367\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8a563b1\" data-id=\"8a563b1\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1fd125f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1fd125f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-04449f2\" data-id=\"04449f2\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e3559e elementor-widget elementor-widget-text-editor\" data-id=\"4e3559e\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pentest consists of five parts:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e916914 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e916914\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-cfeb5b7\" data-id=\"cfeb5b7\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dcaebcb elementor-widget elementor-widget-text-editor\" data-id=\"dcaebcb\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol>\n \t<li aria-level=\"1\"><span style=\"font-size: 16px; letter-spacing: 0px;\">The test begins with <strong>the definition<\/strong> of the test, including its scope, purpose, methods, and data collection (network and domain names, mail server) to better understand the operation of the device and its potential vulnerabilities.<\/span><\/li>\n<br> \t\n<li aria-level=\"1\">The next step is to <strong>observe<\/strong> how the device responds to various tests. Static analysis observes program code and its behavior on simulated attacks. Dynamic analysis scans the program code during device operation, which is more practical as it displays more accurate data.<\/li>\n<br> \t\n<li aria-level=\"1\">The third step uses <strong>different types of web attacks<\/strong>, SQL injection, scripting between websites, and backdoor to detect vulnerabilities in devices.<\/li>\n<br> \n<li aria-level=\"1\">The penultimate step is to <strong>keep access<\/strong> to the system as long as possible. This simulates threats that remain in the system for months after the initial intrusion.<\/li>\n<br> \t\n<li aria-level=\"1\">The test ends with a <strong>report<\/strong> on all vulnerabilities, stolen data, and the final time of compromised access to the system.<\/li>\n<\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e59b740\" data-id=\"e59b740\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9190353 elementor-widget elementor-widget-image\" data-id=\"9190353\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"1104\" src=\"https:\/\/static.angelis.si\/uploads\/2021\/11\/reading-business-report-2021-08-29-04-27-40-utc-scaled-e1639047687709-768x1104.jpg\" class=\"attachment-medium_large size-medium_large wp-image-11270\" alt=\"\" srcset=\"https:\/\/static.angelis.si\/uploads\/2021\/11\/reading-business-report-2021-08-29-04-27-40-utc-scaled-e1639047687709-768x1104.jpg 768w, https:\/\/static.angelis.si\/uploads\/2021\/11\/reading-business-report-2021-08-29-04-27-40-utc-scaled-e1639047687709-209x300.jpg 209w, https:\/\/static.angelis.si\/uploads\/2021\/11\/reading-business-report-2021-08-29-04-27-40-utc-scaled-e1639047687709-712x1024.jpg 712w, https:\/\/static.angelis.si\/uploads\/2021\/11\/reading-business-report-2021-08-29-04-27-40-utc-scaled-e1639047687709-1068x1536.jpg 1068w, https:\/\/static.angelis.si\/uploads\/2021\/11\/reading-business-report-2021-08-29-04-27-40-utc-scaled-e1639047687709-440x633.jpg 440w, https:\/\/static.angelis.si\/uploads\/2021\/11\/reading-business-report-2021-08-29-04-27-40-utc-scaled-e1639047687709.jpg 1352w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4674c79 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4674c79\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c94e44d\" data-id=\"c94e44d\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-28e79d4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"28e79d4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-544acd6\" data-id=\"544acd6\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a66893b elementor-widget elementor-widget-heading\" data-id=\"a66893b\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Penetration testing and threat evaluation together ensure the security of the systems.\u200b<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1fe0d5d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1fe0d5d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-fa2be48\" data-id=\"fa2be48\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-989112f elementor-widget elementor-widget-text-editor\" data-id=\"989112f\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In a time when digitalization is present in all business segments, you cannot afford to fail. The presented methods can protect your computer systems only with the help of IT security engineers who are thoroughly acquainted with the mentioned approaches and can protect the IT infrastructure.<\/p><p>Check our website\u00a0<a href=\"https:\/\/angelis.agency\" target=\"_blank\" rel=\"noopener\">angelis.agency<\/a>, and <a href=\"https:\/\/angelis.agency\/contact\/\" target=\"_blank\" rel=\"noopener\">contact our ANGELIS experts<\/a> for cyber security. Our Certified Ethical Hacker (The Certified Ethical Hacker certification is EC Council\u2019s topmost renowned and demandable credential) will help your company to perform the preventive, helpful, and secured measures to protect the system in an ethical manner.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-16ac727\" data-id=\"16ac727\" data-element_type=\"column\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-81d8931 elementor-widget elementor-widget-spacer\" data-id=\"81d8931\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e473d08 elementor-widget elementor-widget-image\" data-id=\"e473d08\" data-element_type=\"widget\" data-settings=\"{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1080\" height=\"524\" src=\"https:\/\/static.angelis.si\/uploads\/2021\/11\/Angelis.svg\" class=\"attachment-full size-full wp-image-10608\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Don&#8217;t wait idly for the cyber attack on your company to happen&#8230;\u200b The latest research predicts that the damage from cyber-attacks will rise to over $ 6 trillion by the end of 2021. It is no surprise then, that companies [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":10547,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[48],"tags":[],"class_list":["post-9653","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.6 (Yoast SEO v25.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A good defense is the best attack against cyber threats - ANGELIS AGENCY<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A good defense is the best attack against cyber threats\" \/>\n<meta property=\"og:description\" content=\"Don&#8217;t wait idly for the cyber attack on your company to happen&#8230;\u200b The latest research predicts that the damage from cyber-attacks will rise to over $ 6 trillion by the end of 2021. It is no surprise then, that companies [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"ANGELIS AGENCY\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-30T13:45:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-09T11:06:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/static.angelis.si\/uploads\/2021\/11\/cs.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/\",\"url\":\"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/\",\"name\":\"A good defense is the best attack against cyber threats - ANGELIS AGENCY\",\"isPartOf\":{\"@id\":\"https:\/\/angelis.agency\/sl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/static.angelis.si\/uploads\/2021\/11\/cs.jpg\",\"datePublished\":\"2021-11-30T13:45:44+00:00\",\"dateModified\":\"2021-12-09T11:06:38+00:00\",\"author\":{\"@id\":\"https:\/\/angelis.agency\/sl\/#\/schema\/person\/f1d68010ef57267bb869ca6cacf54fe8\"},\"breadcrumb\":{\"@id\":\"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/#primaryimage\",\"url\":\"https:\/\/static.angelis.si\/uploads\/2021\/11\/cs.jpg\",\"contentUrl\":\"https:\/\/static.angelis.si\/uploads\/2021\/11\/cs.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/angelis.agency\/sl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A good defense is the best attack against cyber threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/angelis.agency\/sl\/#website\",\"url\":\"https:\/\/angelis.agency\/sl\/\",\"name\":\"ANGELIS AGENCY\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/angelis.agency\/sl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/angelis.agency\/sl\/#\/schema\/person\/f1d68010ef57267bb869ca6cacf54fe8\",\"name\":\"Alen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/angelis.agency\/sl\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d61473766b8d860408e0f4f879f294e46871423f06fa0ade4755258bfb6c1c86?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d61473766b8d860408e0f4f879f294e46871423f06fa0ade4755258bfb6c1c86?s=96&d=mm&r=g\",\"caption\":\"Alen\"},\"url\":\"https:\/\/angelis.agency\/en\/author\/alen\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A good defense is the best attack against cyber threats - ANGELIS AGENCY","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/","og_locale":"en_US","og_type":"article","og_title":"A good defense is the best attack against cyber threats","og_description":"Don&#8217;t wait idly for the cyber attack on your company to happen&#8230;\u200b The latest research predicts that the damage from cyber-attacks will rise to over $ 6 trillion by the end of 2021. It is no surprise then, that companies [&hellip;]","og_url":"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/","og_site_name":"ANGELIS AGENCY","article_published_time":"2021-11-30T13:45:44+00:00","article_modified_time":"2021-12-09T11:06:38+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/static.angelis.si\/uploads\/2021\/11\/cs.jpg","type":"image\/jpeg"}],"author":"Alen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/","url":"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/","name":"A good defense is the best attack against cyber threats - ANGELIS AGENCY","isPartOf":{"@id":"https:\/\/angelis.agency\/sl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/#primaryimage"},"image":{"@id":"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/static.angelis.si\/uploads\/2021\/11\/cs.jpg","datePublished":"2021-11-30T13:45:44+00:00","dateModified":"2021-12-09T11:06:38+00:00","author":{"@id":"https:\/\/angelis.agency\/sl\/#\/schema\/person\/f1d68010ef57267bb869ca6cacf54fe8"},"breadcrumb":{"@id":"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/#primaryimage","url":"https:\/\/static.angelis.si\/uploads\/2021\/11\/cs.jpg","contentUrl":"https:\/\/static.angelis.si\/uploads\/2021\/11\/cs.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/angelis.agency\/en\/a-good-defense-is-the-best-attack-against-cyber-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/angelis.agency\/sl\/"},{"@type":"ListItem","position":2,"name":"A good defense is the best attack against cyber threats"}]},{"@type":"WebSite","@id":"https:\/\/angelis.agency\/sl\/#website","url":"https:\/\/angelis.agency\/sl\/","name":"ANGELIS AGENCY","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/angelis.agency\/sl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/angelis.agency\/sl\/#\/schema\/person\/f1d68010ef57267bb869ca6cacf54fe8","name":"Alen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/angelis.agency\/sl\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d61473766b8d860408e0f4f879f294e46871423f06fa0ade4755258bfb6c1c86?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d61473766b8d860408e0f4f879f294e46871423f06fa0ade4755258bfb6c1c86?s=96&d=mm&r=g","caption":"Alen"},"url":"https:\/\/angelis.agency\/en\/author\/alen\/"}]}},"_links":{"self":[{"href":"https:\/\/angelis.agency\/en\/wp-json\/wp\/v2\/posts\/9653","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/angelis.agency\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/angelis.agency\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/angelis.agency\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/angelis.agency\/en\/wp-json\/wp\/v2\/comments?post=9653"}],"version-history":[{"count":0,"href":"https:\/\/angelis.agency\/en\/wp-json\/wp\/v2\/posts\/9653\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/angelis.agency\/en\/wp-json\/wp\/v2\/media\/10547"}],"wp:attachment":[{"href":"https:\/\/angelis.agency\/en\/wp-json\/wp\/v2\/media?parent=9653"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/angelis.agency\/en\/wp-json\/wp\/v2\/categories?post=9653"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/angelis.agency\/en\/wp-json\/wp\/v2\/tags?post=9653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}