Darren Humphries

Darren Humphries

Build Layered Security & Proactively Manage Threat Detection

Cyber threats can be categorised into opportunistic, material, and targeted attacks, each requiring different levels of preparedness. 

 Opportunistic Attacks

Random, large-scale attacks such as phishing emails that aim to exploit vulnerabilities without specific targeting. Like a pickpocket stealing your phone in a pub—it happens because an opportunity presents itself. 

  • Impact: Typically affects individuals, user accounts, or a single device rather than an entire business. 
  • Preparedness & Risk: The more prepared you are for these attacks (e.g., phishing awareness training), the stronger your baseline security posture becomes. 

Material Breaches

More significant breaches that compromise a business’s critical infrastructure, potentially causing operational shutdowns or financial losses. Like a physical fight. If you’re trained in martial arts (i.e., cyber security preparedness), you’re inherently better at handling it. 

  • Impact: Affects entire organisations, leading to financial, reputational, and operational damage. 
  • Preparedness & Risk: If an organisation is highly prepared against opportunistic attacks, it inherently starts at a higher level of preparedness against material breaches. 

Targeted Attacks

Sophisticated, deliberate cyber espionage or state-sponsored attacks (e.g., a nation-state targeting a competitor for intellectual property theft). Like a trained assassin with a mission—it requires an advanced level of defence. 

  • Impact: High-stakes threats with national security or large-scale financial implications. 
  • Preparedness & Risk: Strength in defending against material breaches increases resilience against targeted attacks 

To aid in this understanding, find the two graphics below. 

Figure 1 & 2: This illustrates how to profile a threat actor, detailing the key elements to consider in this profiling process.  


Figur
e 3: This demonstrates the integration of threat profiling into risk management. It highlights how threat informs risk, identifies exploitation through weaknesses and vulnerabilities, and discusses the implementation of countermeasures to reduce these vulnerabilities.
 

 

The Preparedness Scale: Inherited Security Maturity 

  • Preparedness is cumulative: Strong protection against opportunistic attacks raises the baseline for handling material breaches. 
  • Example: If an organisation scores 10/10 on opportunistic preparedness, it doesn’t start at 1 for material breaches—it starts at 4. 
  • Similarly, a 7/10 in material breach preparedness means starting at 4 on the targeted attack scale. 

Trends & Observations 

  • Ransomware & phishing attacks are increasing, making opportunistic attacks a growing threat. 
  • Material breaches are decreasing, suggesting businesses are improving security posture. 
  • Being unprepared for opportunistic threats raises vulnerability to more severe breaches.

A well-prepared defence against smaller, opportunistic attacks lays the groundwork for mitigating larger, more severe breaches. Organisations must focus on building layered security, continuous training, and proactive threat detection to stay ahead of evolving cyber threats.