Access42 Whitepaper

"Common tactics used by attackers"

(and how to find and stop them)

Attacks on corporate networks are becoming more and more common. Companies face phishing e-mails, ransomware and intellectual property theft. In order to be resilient against these attacks, companies need to have insight into the working methods of adversaries. This is the only way to take adequate measures to prevent or repel an attack. To gain insight into these attacks, companies are using the MITRE ATT&CK® framework as a basis. Download our free whitepaper!

Attacks on corporate networks are becoming more and more common. Companies face phishing e-mails, ransomware and intellectual property theft. In order to be resilient against these attacks, companies need to have insight into the working methods of adversaries. This is the only way to take adequate measures to prevent or repel an attack. To gain insight into these attacks, companies are using the MITRE ATT&CK® framework as a basis. Download our free whitepaper!

Download our free whitepaper!

Which tactics are used in an attack on a company network?

The framework distinguishes fourteen tactics, the nine most
common tactics are elaborated in this whitepaper:
Reconnaissance, Initial Access, Execution, Persistence, Evasion,
Discovery, Lateral Movement, Command & Control and Impact.