Presented by Peters & Associates · 2020-01-23 · Source: Webroot Threat Research 2018 Malware &...

14
Presented by Peters & Associates Presented by Peters & Associates

Transcript of Presented by Peters & Associates · 2020-01-23 · Source: Webroot Threat Research 2018 Malware &...

Page 1: Presented by Peters & Associates · 2020-01-23 · Source: Webroot Threat Research 2018 Malware & PUAs Ransomware RDP Incursions Malicious URLs & IPs Phishing Cryptojacking The amount

Presented by Peters & AssociatesPresented by Peters & Associates

Page 2: Presented by Peters & Associates · 2020-01-23 · Source: Webroot Threat Research 2018 Malware & PUAs Ransomware RDP Incursions Malicious URLs & IPs Phishing Cryptojacking The amount

Webroot Threat Intelligence & Current Threat Landscape

Max WickerChannel Account Manager

Page 3: Presented by Peters & Associates · 2020-01-23 · Source: Webroot Threat Research 2018 Malware & PUAs Ransomware RDP Incursions Malicious URLs & IPs Phishing Cryptojacking The amount

What Webroot Does

Webroot delivers cloud-based endpoint security,

network security, security awareness training, and

threat intelligence services to protect businesses

and individuals in a connected world.

“ “

Page 4: Presented by Peters & Associates · 2020-01-23 · Source: Webroot Threat Research 2018 Malware & PUAs Ransomware RDP Incursions Malicious URLs & IPs Phishing Cryptojacking The amount

Webroot at a GlanceFirst to harness the cloud and artificial intelligence to secure the connected world.

13k+ MSP PARTNERS

300k+ BUSINESS CUSTOMERS

27+ MillionOEM USERS

60+ MillionLICENSED ENDPOINTS

#1ENDPOINT PROTECTION

FOR SMBS & MSPS

#1IN OEM

THREAT INTELLIGENCE

#1CONSUMER ENDPOINT

SHARE AT LARGEST

U.S. SOFTWARE RETAILER

Page 5: Presented by Peters & Associates · 2020-01-23 · Source: Webroot Threat Research 2018 Malware & PUAs Ransomware RDP Incursions Malicious URLs & IPs Phishing Cryptojacking The amount

Webroot Innovated the Use of Cloud Threat Intelligence

To build both security

intelligence and threat

analysis processing in

the cloud

To utilize millions of

global endpoint clients

as real-time threat

sensors, providing

intelligence directly

to the cloud

To reduce time to

detect/protect from days

to seconds and provide

real-time protection from

emerging threats

To implement the level

of advanced machine

learning required

to make definitive

automated

determinations

Webroot is the 1st…

Page 6: Presented by Peters & Associates · 2020-01-23 · Source: Webroot Threat Research 2018 Malware & PUAs Ransomware RDP Incursions Malicious URLs & IPs Phishing Cryptojacking The amount

Webroot Threat Intelligence PlatformAnalyzes half-a-trillion data objects daily powered by machine learning

Real-world intelligence

captured from global network

of endpoints and vendor

partners

A virtuous cycle of valuable

intelligence, constantly

enriching the platform

Page 7: Presented by Peters & Associates · 2020-01-23 · Source: Webroot Threat Research 2018 Malware & PUAs Ransomware RDP Incursions Malicious URLs & IPs Phishing Cryptojacking The amount

32+ Billion

URLs

750+ Million

Domains

4.3 Billion

IP Addresses

15+ Billion

File Behavior

Records

62+ Million

Mobile Apps

67+ Million

Connected

Sensors

Analysis on a Massive Scale

Webroot BrightCloud® Threat Intelligence services continuously classify and score 95% of the internet, covering the entire IPv4 space and in-use IPv6.

Page 8: Presented by Peters & Associates · 2020-01-23 · Source: Webroot Threat Research 2018 Malware & PUAs Ransomware RDP Incursions Malicious URLs & IPs Phishing Cryptojacking The amount

26k+New Malware

and PUAs

Threats Impact Users and Business

25kNew Malicious

URLs

6kNew Phishing

Sites

1.2M+New File

Encounters

100kNew Malicious

IPs

Threats Discovered Daily

This includes

Ransomware

& Cryptoware

Page 9: Presented by Peters & Associates · 2020-01-23 · Source: Webroot Threat Research 2018 Malware & PUAs Ransomware RDP Incursions Malicious URLs & IPs Phishing Cryptojacking The amount

BrightCloud® Threat Intelligence Services are available through and for more

than 100+ leading network and security provider solutions.

Webroot in the Enterprise Through Partner Integrations

Page 10: Presented by Peters & Associates · 2020-01-23 · Source: Webroot Threat Research 2018 Malware & PUAs Ransomware RDP Incursions Malicious URLs & IPs Phishing Cryptojacking The amount

The Current Threat Landscape

Source: Webroot Threat Research 2018

Malware & PUAs Ransomware RDP Incursions

Malicious

URLs & IPs Phishing Cryptojacking

The amount of daily

ransomware attacks

(Source: CyberSense)

4,000Projected losses

worldwide by 2020

from cybercrime (up

from 3 trillion 2015)

(Source: Cybersecurity Ventures)

$6 Trillion

(Source: Better Business Bureau)

The percentage of

small companies

faced with existential

risk within 30 days of

a major data loss

65%The percentage of

SMBs reporting being

targeted and breached

(Source: Verizon DBIR)

58%

Most Prevalent Threats

#1#3 #2

SMBs Under Persistent Threat

Page 11: Presented by Peters & Associates · 2020-01-23 · Source: Webroot Threat Research 2018 Malware & PUAs Ransomware RDP Incursions Malicious URLs & IPs Phishing Cryptojacking The amount

The Dominance of Cryptojacking

Page 12: Presented by Peters & Associates · 2020-01-23 · Source: Webroot Threat Research 2018 Malware & PUAs Ransomware RDP Incursions Malicious URLs & IPs Phishing Cryptojacking The amount

Criminals Exploit Human Error

91%5of cyberattacks start with

phishing email

93%4of phishing emails involve

ransomware90%1of breaches are due

to human error

93%3Percentage of breaches

caused by phishing and scams

Advanced social engineering is the normMost SMBs consider user education a necessity2

Sources: 1: chiefexecutive.net/almost-90-cyber-attacks-caused-human-error-behavior | 2: ESG SMB Security Trends 2018 | 3: 2018 Verizon Data Breach Investigations Report | 4: PhishMe June 2016 |

5: Dark Reading 7 ways hackers target your employees

Page 13: Presented by Peters & Associates · 2020-01-23 · Source: Webroot Threat Research 2018 Malware & PUAs Ransomware RDP Incursions Malicious URLs & IPs Phishing Cryptojacking The amount

Top 10 Phishing Impersonated Companies

Page 14: Presented by Peters & Associates · 2020-01-23 · Source: Webroot Threat Research 2018 Malware & PUAs Ransomware RDP Incursions Malicious URLs & IPs Phishing Cryptojacking The amount

Thank you!