A compromise assessment report is a specific type of cyber risk assessment that identifies vulnerabilities, active threats, and threats that are lurking on an organization’s network. It gives security teams a clear view of the activity on the network in addition to a comprehensive analysis of the organization’s cyber risk exposure.
Here’s how it works:
BlackBerry’s cybersecurity experts start by identifying indicators of compromise. Then, they use risk-prioritized findings to carry out in-depth investigations of specific threats. Finally, the compromise assessment report is delivered, sharing the investigation findings and providing guidance for reducing the network’s attack surface and mitigating risks from compromised data.
A compromise assessment analyzes digital exposure to risks such as sabotage, data exfiltration, command and control activities, malware mechanisms, user authentication abnormalities, and configurations of the organization’s network and applications after an attack so that companies can respond appropriately.