27 Aug 2024
Malware and End User Attacks Overview
Make sure you’re aware of the popular techniques used by threat actors to obtain access to a network or execute these compromises. This practice note reviews the major types of end user attacks that may be executed against your network, ways to detect attacks, and how to prevent and respond to them.
Related Content
Review this practice note to learn about the ways different types of threat actors gain access to your network, and what they do when they get there. This note discusses special types of intrusions, such as insider threats, email compromise, and supply chain compromise, and the steps to take in responding to a data security incident.
- Watch this video series on modern approaches to cybersecurity to learn about trends in cybersecurity attacks and how to defend against evolving threats:
- Modern Approaches to Cybersecurity: Evolution of Attacks Video
- Modern Approaches to Cybersecurity: Types of Threat Actors Video
- Modern Approaches to Cybersecurity: How Attackers Gain Access Video
- Modern Approaches to Cybersecurity: Business Email Compromise Video
- Modern Approaches to Cybersecurity: Endpoint Detection and Response Video
- Modern Approaches to Cybersecurity: Incident Response Video
- Ransomware Planning and Response Best Practices
Brush up on steps you can take to minimize the risk of a ransomware attack and reduce the harm an attack can cause.
- Data Breach Planning and Management
Check out this discussion of how organizations should both plan for and manage a data breach.
- Data Breach Avoidance and Response Plan Checklist
Review this guidance on what should be included in breach avoidance and response plans.
- Data Breach Notification Resource Kit
Navigate Practical Guidance resources addressing data breach management and notification requirements.
Practical Guidance Updates
Featuring the latest updates from your Practical Guidance account.
- Artificial Intelligence (AI) Legislation State Law Survey covers enacted state and notable local legislation that relates to the topic of AI.
- Artificial Intelligence (AI) Legislation Tracker (2024) includes state, federal, and notable municipal legislation related to the use of AI active, or proposed after, January 1, 2024.
- Privacy Legislation Tracker: State Comprehensive Consumer Privacy Bills (2024) is here to save you time and keep you current on state privacy bills.
- Document alerts allow you to stay current on legal developments that affect your practice. Find out how to set up your document alerts.
- For Practical Guidance content on important recent trends, review these Resource Kits:
- Generative Artificial Intelligence (AI) Resource Kit
- Chevron Reversal Impact Resource Kit
- Environmental, Social, and Governance (ESG) Resource Kit
- Public Interest, Pro Bono, and Non-Profit Resource Kit
- Review this guidance, AI and Legal Ethics: What Lawyers Need to Know, in the Summer Edition of the Practical Guidance Journal. Explore insights from a judge into the use of GenAI in civil litigation, including discovery issues, use cases, and key takeaways. Also advance your career with professional and business development guidance.
- Legal Developments provide the latest updates and analyses of emerging topics impacting your practice area. Visit the Legal Developments page to see the latest topics, which also include breaking legal news and related Practical Guidance content.
- Learn about the 2000+ leading attorney authors contributing to our 26 practice areas in the Practical Guidance Author Center. Interested in becoming a Practical Guidance author? Click here for details. Practical Guidance is committed to amplifying diverse voices of attorneys across all differences, including gender and race.
PRACTICAL GUIDANCE CUSTOMER EMAIL EDITION ON THE WEB
Experience results today with practical guidance, legal research, and data-driven insights—all in one place.
Experience Lexis+