Post on 14-Jul-2015
average annual cost of cybercrime facing
businesses
Number of records stolen
The Cyber Security Council's 5 most effective solutions for dealing with cyber threat:
Reduce number of users with
administrative privileges
Patch system and application software within 48 hours
Patch system software within
within 48 hours
Use of standard, secure system configurations
Application whitelisting
App control is the #1 strategy forovercoming real world attacks (Australian DoD)
Password protection Antivirus software
90%of passwords are
vulnerable to hacking
Top 5 common passwords of 2013
92% of organizations say up to date antivirus
software is in use today...
... yet only 34% rate it as highly effective in preventing cyber intrusions
Firewalls
88% say a perimeter firewall is in use today...
...the remaining 12%have plans to implement one
34% of an organization’s total time on IT security issues is dedicated to managing user profiles ...
92% of critical Microsoft vulnerabilities
would be mitigated by removing admin rights
100% of Internet Explorer vulnerabilities would be mitigated by removing admin rights.
@
Phishing
53%
Rogue software /downloads
60%
Target
Unpatched vulnerabilities
74%
Targeted attacks (APTs)
77%
$7m=of companies are either
not prepared or only minimally prepared to
deal with attacks
52%Yet
is dedicated to securing the endpoint...
48%...whilesay that securing the endpoint is difficult
to achieve
81%...yet
increase in the number of data breaches in 2013
62%There was a Over 288,000 new cyber threats are
reported every day
– that’s 3 persecond
US Military Veterans LivingSocial Adobe
110Million
70Million
50Million
38Million
Man in themiddle attacks
38%
++- - =$7,000,000
1 . 1 2 3 4 5 6 2 . p a s s w o r d3 . 1 2 3 4 5 6 7 84 . q w e r t y5 . a b c 1 2 3
UPDATE0 1 E A S Y 1 0 01 0 1 0 1 0 0 1
0 1 1 0 0 0 0 11 0 1 0 1 1 0 0
6thof never
1 0 1 0 1 0 0 1
0 1 1 0 0 0 0 1
0 1 1 0 0 0 0 11 0 1 0 1 1 0 0
1 0 1 0 1 0 0 1
0 1 1 0 0 0 0 1
0 1 1 0 0 0 0 11 0 1 0 1 1 0 0
1 0 1 0 1 0 0 1
0 1 1 0 0 0 0 1
0 1 1 0 0 0 0 11 0 1 0 1 1 0 0
1 0 1 0 1 0 0 1
0 1 1 0 0 0 0 1
0 1 1 0 0 0 0 11 0 1 0 1 1 0 0
1 0 1 0 1 0 0 10 1 1 0 0 0 0 1
1 0 1 0 1 0 0 10 1 1 0 0 0 0 1
A
Are businesses today doing enough to succeed in the battle against cyber security threats and are the traditional methods they are using the most effective?
OvercomingCyber Attacks
Avecto@avectoAvecto
avecto.cominfo@avecto.com
SourcesInfosec Security Survey: conducted by Avecto at InfoSec 2014. The Internet Society: http://www.internetsociety.org/history?gclid=CLyb45al-b0CFcHnwgodhIMAxwhttp: //www.personal.psu.edu/users/j/m/jms6423/Engproj/History%20of%20Computer%20Crime.xhtmlComputer Hope: http://www.computerhope.com/history/internet.htmHeartbleed.com: http://heartbleed.com/Microsoft: http://research.microsoft.com/en-us/um/people/mbj/Smiley/smiley.htmlAbout.com: http://email.about.com/od/emailtrivia/f/first_spam.htmInternet World Stats: http://www.internetworldstats.com/emarketing.htmLiveScience: http://www.livescience.com/20727-internet-history.htmlWikipedia: http://en.wikipedia.org/wiki/Timeline_of_computer_viruses_and_wormshttp://www.nytimes.com/2014/02/09/us/snowden-used-low-cost-tool-to-best-nsa.html?hp&_r=2Pew Research Internet Project: http://www.pewinternet.org/2014/03/11/world-wide-web-timeline/
UKHobart HouseCheadle Royal Business ParkCheadle, Cheshire, SK8 3SR
Phone +44 (0)845 519 0114Fax +44 (0)845 519 0115
Americas125 Cambridge Park DriveSuite 301, Cambridge, MA 02140, USA
Phone 978 703 4169Fax 978 910 0448
AustraliaLevel 8350 Collins Street, Melbourne, Victoria 3000, Australia
Phone +613 8605 4822Fax +613 8601 1180
Are you protected?
Cyber challenges facing today’s businesses
Major real life data breaches in 2013/14
Effectiveness of traditional security solutions
Proactive defense in depth
Security
Infographic