Keys to Network Security & Shocking Statistics
-
Upload
christine-spicuzza -
Category
Technology
-
view
1.374 -
download
2
Transcript of Keys to Network Security & Shocking Statistics
![Page 1: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/1.jpg)
Cybersecurity Statistics That Will Shock, Scare,
and Motivate You to Protect Your Company
10
![Page 2: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/2.jpg)
Sony. JPMorgan. eBay. Target. Jimmy Johns.
![Page 3: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/3.jpg)
One data breach after another.
![Page 4: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/4.jpg)
Data breaches are just one element of a company’s security concerns.
![Page 5: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/5.jpg)
These statistics will shock you.
Statistics from IBM’s Security Intelligence Index Report, 2014; Agari’s “State of Email Trust Report”, 2014; and PandaLabs
Annual Report, 2014.
![Page 6: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/6.jpg)
They may scare you.
![Page 7: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/7.jpg)
Hopefully they will motivate you.
![Page 8: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/8.jpg)
So that you can protect your company (and your customers) before it’s too late.
![Page 9: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/9.jpg)
There were 1.5 million monitored cyber attacks in the U.S. in 2013.
#1
![Page 10: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/10.jpg)
Companies are attacked about 16,800 times a year on average.
#2
![Page 11: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/11.jpg)
Email continues to be the most widely used and effective method of attack.
#3
![Page 12: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/12.jpg)
In fact, 75% of companies surveyed in a recent report were identified to be at high
risk of malicious email attacks.
#4
![Page 13: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/13.jpg)
And 43% of c-level executives say employee errors are the greatest threat to sensitive
data. (IBM Services)
#5
![Page 14: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/14.jpg)
Over 75% of security incidents targeted 5 industries. Can you guess them?
#6
![Page 15: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/15.jpg)
Health and social services.
![Page 16: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/16.jpg)
Finance and insurance.
![Page 17: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/17.jpg)
Manufacturing.
![Page 18: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/18.jpg)
Information and communication.
![Page 19: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/19.jpg)
Retail and wholesale.
![Page 20: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/20.jpg)
38% - the percentage of attacks that were caused by malicious code.
#7
![Page 21: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/21.jpg)
An email “from” your healthcare company is 4x more likely to be fraudulent than an email
from a social networking site.
#8
![Page 22: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/22.jpg)
There has been a 270% increase in identified “Business Email Compromise” victims
in 2015. (FBI)
#9
![Page 23: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/23.jpg)
Over 200,000 new samples of malware were identified every single day in 2014.
#10
![Page 24: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/24.jpg)
Are you confident your company is protected?
![Page 25: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/25.jpg)
Do you use a multi-layered approach to secure your network and infrastructure?
![Page 26: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/26.jpg)
Email Anti-Spam FilteringPerimeter Security & Firewalls
Anti-Virus SoftwareWeb Filtering
Patch ManagementBackup Data & Recovery
Email/File EncryptionStrong Password & Updating Policy
Two-Factor AuthenticationControlled Imaging
End-User (Employee) Awareness Training
![Page 27: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/27.jpg)
The bad guys are becoming more aggressive and sophisticated every day.
![Page 28: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/28.jpg)
They are no longer lone wolves.
![Page 29: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/29.jpg)
They are organized armies that attack companies of all sizes and in various
industries.
![Page 30: Keys to Network Security & Shocking Statistics](https://reader036.fdocuments.us/reader036/viewer/2022070511/58aeb09f1a28ab00708b50bd/html5/thumbnails/30.jpg)
They are coming. Are you ready?
11 Keys to Network Securityhttp://www.apogeeitservices.com/lp/11-keys-to-network-security