SlideShare une entreprise Scribd logo
1  sur  24
Cisco Security Intelligence
Annual Security Report &
Cisco Connected World Technology Report
13BWEB REQUESTS
                                                            150M
                                                             GLOBALLY DEPLOYED ENDPOINTS
                                                                                           35%
                                                                                           WORLDWIDE EMAIL TRAFFIC




                                  75 TB
                                   DATA RECEIVED PER DAY
                                                                                1.6M
                                                                                 GLOBALLY DEPLOYED DEVICES




              SensorBase                                   Threat Operations Center             Dynamic Updates


© 2013 Cisco and/or its affiliates. All rights reserved.                                                      Cisco Confidential   2
36%
      22%
       Online video
                                                      search engines
                                                                        20%                         13%
                                                                       Social networks          Advertisements




                                                                                           Hits to Top Web Properties

                                                                              Social Network

                                                                                        Ads

                                                                                Online Video

                                                                              Search Engine

                                                                                               0%   10%      20%        30%             40%


© 2013 Cisco and/or its affiliates. All rights reserved.                                                                Cisco Confidential    3
Search Engines vs. Counterfeit Software

                                                    27x more likely to deliver malicious content
                                                    Online Advertisements vs. Pornography

                                                    182x more likely to deliver malicious content
                                                    Online Shopping vs. Counterfeit Software

                                                    21x more likely to deliver malicious content
© 2013 Cisco and/or its affiliates. All rights reserved.                                       Cisco Confidential   4
90%
                                                                                                                 Perscription Drugs
                                                                                                                 Prescription Drugs
   80%                                                                                                           Luxury Watches
                                                                                                                 Luxury Watches
                                                                                                                 Credit Card
                                                                                                                 Credit Card
   70%
                                                                                                                 Business Reviews
                                                                                                                 Business Reviews
                                                                                                                 Professional Network
   60%                                                                                                           Professional Network
                                                                                                                 Electronic Money Transfer
                                                                                                                 Electronic Money Transfer
                                                                                                                 Accounting Software
   50%                                                                                                           Accounting Software
                                                                                                                 Social Network
                                                                                                                 Social Network
                                                                                                                 Professional Associations
   40%                                                                                                           Professional Associations
                                                                                                                 Airline
                                                                                                                 Airline
   30%                                                                                                           Mail
                                                                                                                 Mail
                                                                                                                 Weight Loss
                                                                                                                 Weight Loss
                                                                                                                 Government Organization
   20%
                                                                                                                 Government Organization
                                                                                                                 Windows Software
   10%                                                                                                           Windows Software
                                                                                                                 Cellular Company
                                                                                                                 Cellular Company
                                                                                                                 Online Classifieds
     0%                                                                                                          Taxes
           Jan              Feb              Mar           Apr   May   Jun   Jul   Aug   Sep   Oct   Nov   Dec




© 2013 Cisco and/or its affiliates. All rights reserved.                                                                     Cisco Confidential   5
APRIL

                                                                  15
 January-March:                                            February-April:            January-March and
 Windows Software                                          Tax software spam during   September-December:
 spam, which coincided with                                U.S. tax season.           Spam based on Professional
 the release of the Microsoft                                                         networks like
 Windows 8 consumer                                                                   LinkedIn, correlated with
 preview                                                                              desire for a change in career
                                                                                      during the beginning and end
                                                                                      of the year.
© 2013 Cisco and/or its affiliates. All rights reserved.                                                 Cisco Confidential   6
Scandinavia on the Rise | 8 of Top 10 Countries in EMEA


    The Web is an equal-opportunity infector
       33% of all web malware                              Russia, Denmark, and Sweden
       encounters resulted from                            were virtually tied for second place
       domains hosted in the U.S.
                                                                    Denmark
                                                                     9.55%

                                                                              Russia
                                                                               9.79%
                                                                 Sweden
                    United States                                 9.27%

                        33%




© 2013 Cisco and/or its affiliates. All rights reserved.                                Cisco Confidential   7
The Bigger the Company…



                                                           Up to 2 ½ times more risk
                                                           of encountering Web malware
                                                            for large organizations

                                                                                     All sizes of companies
                                                                                     experience significant risk




© 2013 Cisco and/or its affiliates. All rights reserved.                                                Cisco Confidential   8
Downloader 1.12%                           Worm 0.89%

              Infostealing 3.49%                            Virus 0.48%
                                                               Mobile 0.42%
                  Exploit 9.86%
                                                               Scareware 0.16%




               Malscript/Iframe
                       83.43%




© 2013 Cisco and/or its affiliates. All rights reserved.                  Cisco Confidential   9
Android Mobile Device Trending




                                                           Android Malware grows




                                                           2577%                   over 2012

                                                                 .5%
       Mobile make up less
       than .5% of total web
       malware encounters


© 2013 Cisco and/or its affiliates. All rights reserved.                                       Cisco Confidential   10
Global spam volumes down 18%
                                                     in 2012

                                                     with spammers keeping banker’s hours for a
                                                     25% drop over the weekend

                                                                                  1. India
                  India retains spam crown,                                       2. United States
      U.S. skyrockets into                                                        3. Korea
                                                                                  4. China
      second position                                                             5. Vietnam
                                                                                  6. Russia
                                                                                  7. Brazil
                                                                                  8. Saudi Arabia
                                                                                  9. Taiwan
© 2013 Cisco and/or its affiliates. All rights reserved.                          10. Poland         Cisco Confidential   11
862%
                         Over
                                                           growth in IPv6 email messages




                         Only



                                            171%           growth in IPv6 spam




© 2013 Cisco and/or its affiliates. All rights reserved.                         Cisco Confidential   12
The Threat Landscape
And the Next-gen Workforce
A New Dawn for Work, Play, & Privacy
Timing and Sample Qualifications

                   THE THIRD ANNUAL CISCO CONNECTED WORLD TECHNOLOGY REPORT




1800                                                                            1800
  COLLEGE STUDENTS                                                INFORMATION TECHNOLOGY
  and WORKERS                                                     PROFESSIONALS
  Ages 18 to 30


  The survey was translated into local languages and conducted in August 2012 across 18 countries to
  gain at least 100 completes for each subgroup in each country
  18 Countries: United States, Canada, Mexico, Brazil, Argentina, United
  Kingdom, France, Germany, Netherlands, Russia, Poland, Turkey, South
  Africa, Korea, India, China, Japan, Australia
© 2013 Cisco and/or its affiliates. All rights reserved.                                      Cisco Confidential   14
On average, Gen Y uses 2 to 3 Internet
      devices, such as
      laptops, tablets, PCs, smartphones

      Nearly 3 out of 5 say Internet
      browsing should be strictly private at
      work and at home…                                    TEXT

      …Yet nearly 91% believe the age of
      online privacy is over.



      1 in 10 Gen Y have so many
      passwords they lose count and
      forget them regularly.
© 2013 Cisco and/or its affiliates. All rights reserved.          Cisco Confidential   15
Globally 91% of
     global millennials
     feel that the age of
     privacy is over.
     However, one third
     of the respondents
     are not worried
     about all the data
     that is stored and
     captured about them.
© 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   16
Employers vs. Employees




                                                                 Is it okay for employers to
                                                                 track employee Internet
             No                                                  activities if they are using
                                                                 a company device?
            66%
                                                           Yes
                                                           34%
© 2013 Cisco and/or its affiliates. All rights reserved.                                 Cisco Confidential   17
Employers vs. Employees



                                                           1 in 5
                                                           say “my employer tracks internet use
                                                           on company-owned
                                                           PC’s, laptops, smartphones”


                       ?
                                                           Over 1 in 4
                                                           don’t know if their Internet usage
                                                           is being tracked


© 2013 Cisco and/or its affiliates. All rights reserved.                                    Cisco Confidential   18
2 in 5 Gen Y
                                                           Internet browsing should be
                                                           strictly private




                                                           Over 1/3
                                                           It’s okay only if I give permission first


© 2013 Cisco and/or its affiliates. All rights reserved.                                     Cisco Confidential   19
57%

                    90%
                                                           will share email address to get
                                                           discounts and sale notices


                                      shop online          3 out of 5
                                                           rely on customer reviews for
                                                           online shopping


                                                           But 75%
                                                           do not trust most internet
                                                           sites to keep data secure

© 2013 Cisco and/or its affiliates. All rights reserved.                            Cisco Confidential   20
GEN Y AVERAGE:
                                                            2 to 3 devices

           Almost half use 2 devices
                      1 device                             2 devices   3 devices   4 devices   5 or more
                      17%                                  46%         29%          6%          2%

© 2013 Cisco and/or its affiliates. All rights reserved.                                            Cisco Confidential   21
Over 25%                                                        1 in 10
        use 5 to 9 passwords                                            have so many passwords
                                                                        they have lost count!
                                                                           CaTxx123!
                                                                         catxx3210            dogxx321
                                        !                  Catxx321
                                                                            Catxx321
                                                                        X325*1
                                                                             1358acds
                                                                                       ?   CaTxx123!
                                                                                            CaTxx123!
                                                                                                dogxx321
                                                                                           1358acds
                                                                                              1358acds
                                                           catxx3210               X325*1
                                                                           orange321          X325*1
                                                                          ABC123!          X325*1
                                                                          ABC123! 1358acds      1358acds
                                                           catXX12!    catXX12!          1358acds
                                                                                            Catxx321
                                                                          catxx3210
                                                                                barker357!
                                                                                       barker357!
                                                                             Catxx321         barker357!
                                                           CaTxx123!     catXX12! Catxx321
                                                                                    dogxx321       dogxx321
                                                                       dogxx321            dogxx321
                                                                            CaTxx123!      barker357!
                                                           dogxx321                 barker357! ABC123!
                                                                           barker357! ABC123!

© 2013 Cisco and/or its affiliates. All rights reserved.                                          Cisco Confidential   22
Online Identity


                                                             over     1/3 believe
              4 5                     out of
                                  (81%)
                                                           “most people have completely
                                                                                 different
                                                                        online vs. offline
                                                                               identities”
      Believe people have
      different online and                                               less than
      offline identities
                                                                        50% say
                                                                   “my online and offline
                                                                 identities are the same”

© 2013 Cisco and/or its affiliates. All rights reserved.                           Cisco Confidential   23
Disconnect with corporate IT



     40%
     say that company policy forbids
     using company-owned devices for
     personal activities.


  71%                                                      don’t obey policies, almost 3 out of 4



  50%         of IT professionals believe:
    “our employees obey the policies on personal use”

© 2013 Cisco and/or its affiliates. All rights reserved.                                            Cisco Confidential   24

Contenu connexe

En vedette

503 reading quiz
503 reading quiz503 reading quiz
503 reading quiz
amybass
 
Bertamasya ke banda
Bertamasya ke bandaBertamasya ke banda
Bertamasya ke banda
Arya Ningrat
 

En vedette (14)

Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
McAllen Intermediate School District
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School District
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
William Paterson University
William Paterson UniversityWilliam Paterson University
William Paterson University
 
503 reading quiz
503 reading quiz503 reading quiz
503 reading quiz
 
Bertamasya ke banda
Bertamasya ke bandaBertamasya ke banda
Bertamasya ke banda
 
Kelompok 9
Kelompok 9Kelompok 9
Kelompok 9
 

Similaire à 2013 Cisco Annual Security Report

UC4 - One Automation
UC4 - One AutomationUC4 - One Automation
UC4 - One Automation
k1k2sdad
 
S24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.veS24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.ve
HyTrust
 
Haydn shaughnessy on banks and ecosystems
Haydn shaughnessy on banks and ecosystemsHaydn shaughnessy on banks and ecosystems
Haydn shaughnessy on banks and ecosystems
Haydn Shaughnessy
 
Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Demandware tco webinar final 12122012
Demandware tco webinar final 12122012
Thomas Roider
 
Touchcom Sales Presentation
Touchcom Sales PresentationTouchcom Sales Presentation
Touchcom Sales Presentation
ewickline
 
Hp -DA-15dec2011
Hp -DA-15dec2011Hp -DA-15dec2011
Hp -DA-15dec2011
Agora Group
 

Similaire à 2013 Cisco Annual Security Report (20)

CCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas IlyadisCCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas Ilyadis
 
Cymphonix Network Revealer for Real Time Bandwidth Monitoring
Cymphonix Network Revealer for Real Time Bandwidth MonitoringCymphonix Network Revealer for Real Time Bandwidth Monitoring
Cymphonix Network Revealer for Real Time Bandwidth Monitoring
 
Financial Risks to Internet Security
Financial Risks to Internet SecurityFinancial Risks to Internet Security
Financial Risks to Internet Security
 
Infographic: Mobixell Smooth DBRA
Infographic: Mobixell Smooth DBRAInfographic: Mobixell Smooth DBRA
Infographic: Mobixell Smooth DBRA
 
UC4 - One Automation
UC4 - One AutomationUC4 - One Automation
UC4 - One Automation
 
S24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.veS24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.ve
 
Haydn shaughnessy on banks and ecosystems
Haydn shaughnessy on banks and ecosystemsHaydn shaughnessy on banks and ecosystems
Haydn shaughnessy on banks and ecosystems
 
We present Bugscout
We present BugscoutWe present Bugscout
We present Bugscout
 
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
 
Digital Landscape
Digital LandscapeDigital Landscape
Digital Landscape
 
Hacking Trust
Hacking TrustHacking Trust
Hacking Trust
 
ComScore - State of the internet - Brazil
ComScore - State of the internet - BrazilComScore - State of the internet - Brazil
ComScore - State of the internet - Brazil
 
Protecting the identities of your website customers
Protecting the identities of your website customers Protecting the identities of your website customers
Protecting the identities of your website customers
 
Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Demandware tco webinar final 12122012
Demandware tco webinar final 12122012
 
SSMX SocialAirlines
SSMX SocialAirlinesSSMX SocialAirlines
SSMX SocialAirlines
 
Touchcom Sales Presentation
Touchcom Sales PresentationTouchcom Sales Presentation
Touchcom Sales Presentation
 
Discover SEM
Discover SEMDiscover SEM
Discover SEM
 
Hp -DA-15dec2011
Hp -DA-15dec2011Hp -DA-15dec2011
Hp -DA-15dec2011
 
Skelta Software Corporate Presentation
Skelta Software Corporate PresentationSkelta Software Corporate Presentation
Skelta Software Corporate Presentation
 
Sprint - Cloud Services
Sprint - Cloud ServicesSprint - Cloud Services
Sprint - Cloud Services
 

Plus de Cisco Security

The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
Cisco Security
 

Plus de Cisco Security (15)

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
 
Midyear Security Report Infographic
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
 
Cisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report Infographic
 
City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

2013 Cisco Annual Security Report

  • 1. Cisco Security Intelligence Annual Security Report & Cisco Connected World Technology Report
  • 2. 13BWEB REQUESTS 150M GLOBALLY DEPLOYED ENDPOINTS 35% WORLDWIDE EMAIL TRAFFIC 75 TB DATA RECEIVED PER DAY 1.6M GLOBALLY DEPLOYED DEVICES SensorBase Threat Operations Center Dynamic Updates © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. 36% 22% Online video search engines 20% 13% Social networks Advertisements Hits to Top Web Properties Social Network Ads Online Video Search Engine 0% 10% 20% 30% 40% © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. Search Engines vs. Counterfeit Software 27x more likely to deliver malicious content Online Advertisements vs. Pornography 182x more likely to deliver malicious content Online Shopping vs. Counterfeit Software 21x more likely to deliver malicious content © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5. 90% Perscription Drugs Prescription Drugs 80% Luxury Watches Luxury Watches Credit Card Credit Card 70% Business Reviews Business Reviews Professional Network 60% Professional Network Electronic Money Transfer Electronic Money Transfer Accounting Software 50% Accounting Software Social Network Social Network Professional Associations 40% Professional Associations Airline Airline 30% Mail Mail Weight Loss Weight Loss Government Organization 20% Government Organization Windows Software 10% Windows Software Cellular Company Cellular Company Online Classifieds 0% Taxes Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. APRIL 15 January-March: February-April: January-March and Windows Software Tax software spam during September-December: spam, which coincided with U.S. tax season. Spam based on Professional the release of the Microsoft networks like Windows 8 consumer LinkedIn, correlated with preview desire for a change in career during the beginning and end of the year. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. Scandinavia on the Rise | 8 of Top 10 Countries in EMEA The Web is an equal-opportunity infector 33% of all web malware Russia, Denmark, and Sweden encounters resulted from were virtually tied for second place domains hosted in the U.S. Denmark 9.55% Russia 9.79% Sweden United States 9.27% 33% © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8. The Bigger the Company… Up to 2 ½ times more risk of encountering Web malware for large organizations All sizes of companies experience significant risk © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. Downloader 1.12% Worm 0.89% Infostealing 3.49% Virus 0.48% Mobile 0.42% Exploit 9.86% Scareware 0.16% Malscript/Iframe 83.43% © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. Android Mobile Device Trending Android Malware grows 2577% over 2012 .5% Mobile make up less than .5% of total web malware encounters © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. Global spam volumes down 18% in 2012 with spammers keeping banker’s hours for a 25% drop over the weekend 1. India India retains spam crown, 2. United States U.S. skyrockets into 3. Korea 4. China second position 5. Vietnam 6. Russia 7. Brazil 8. Saudi Arabia 9. Taiwan © 2013 Cisco and/or its affiliates. All rights reserved. 10. Poland Cisco Confidential 11
  • 12. 862% Over growth in IPv6 email messages Only 171% growth in IPv6 spam © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. The Threat Landscape And the Next-gen Workforce A New Dawn for Work, Play, & Privacy
  • 14. Timing and Sample Qualifications THE THIRD ANNUAL CISCO CONNECTED WORLD TECHNOLOGY REPORT 1800 1800 COLLEGE STUDENTS INFORMATION TECHNOLOGY and WORKERS PROFESSIONALS Ages 18 to 30 The survey was translated into local languages and conducted in August 2012 across 18 countries to gain at least 100 completes for each subgroup in each country 18 Countries: United States, Canada, Mexico, Brazil, Argentina, United Kingdom, France, Germany, Netherlands, Russia, Poland, Turkey, South Africa, Korea, India, China, Japan, Australia © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
  • 15. On average, Gen Y uses 2 to 3 Internet devices, such as laptops, tablets, PCs, smartphones Nearly 3 out of 5 say Internet browsing should be strictly private at work and at home… TEXT …Yet nearly 91% believe the age of online privacy is over. 1 in 10 Gen Y have so many passwords they lose count and forget them regularly. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
  • 16. Globally 91% of global millennials feel that the age of privacy is over. However, one third of the respondents are not worried about all the data that is stored and captured about them. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
  • 17. Employers vs. Employees Is it okay for employers to track employee Internet No activities if they are using a company device? 66% Yes 34% © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
  • 18. Employers vs. Employees 1 in 5 say “my employer tracks internet use on company-owned PC’s, laptops, smartphones” ? Over 1 in 4 don’t know if their Internet usage is being tracked © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. 2 in 5 Gen Y Internet browsing should be strictly private Over 1/3 It’s okay only if I give permission first © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 20. 57% 90% will share email address to get discounts and sale notices shop online 3 out of 5 rely on customer reviews for online shopping But 75% do not trust most internet sites to keep data secure © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  • 21. GEN Y AVERAGE: 2 to 3 devices Almost half use 2 devices 1 device 2 devices 3 devices 4 devices 5 or more 17% 46% 29% 6% 2% © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
  • 22. Over 25% 1 in 10 use 5 to 9 passwords have so many passwords they have lost count! CaTxx123! catxx3210 dogxx321 ! Catxx321 Catxx321 X325*1 1358acds ? CaTxx123! CaTxx123! dogxx321 1358acds 1358acds catxx3210 X325*1 orange321 X325*1 ABC123! X325*1 ABC123! 1358acds 1358acds catXX12! catXX12! 1358acds Catxx321 catxx3210 barker357! barker357! Catxx321 barker357! CaTxx123! catXX12! Catxx321 dogxx321 dogxx321 dogxx321 dogxx321 CaTxx123! barker357! dogxx321 barker357! ABC123! barker357! ABC123! © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  • 23. Online Identity over 1/3 believe 4 5 out of (81%) “most people have completely different online vs. offline identities” Believe people have different online and less than offline identities 50% say “my online and offline identities are the same” © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
  • 24. Disconnect with corporate IT 40% say that company policy forbids using company-owned devices for personal activities. 71% don’t obey policies, almost 3 out of 4 50% of IT professionals believe: “our employees obey the policies on personal use” © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24

Notes de l'éditeur

  1. Most Generation Y employees believe the age of privacy is over (91%), but one third say that they are not worried about all the data that is stored and captured about them. Tradeoffs are being made as people get more convenience and experience out of the online world – either through simple communications like email and texting to more complex and open communications like social media and online consumerism – at the expense of sharing more information about their lives and lifestyles, and they do not like it. Aside from a couple countries, 16 of 18 featured more than half of their respondent pools saying they are uncomfortable with this loss of privacy and exposure of personal information (and yet they still engage in online activity like social media, online shopping, etc.) MEX (76%) and KOR (75%) exhibited the highest rate of concern about relinquishing privacy and identity online, an interesting finding being that both countries were some of the more prominent ones in social media and online activity. Only one in three (33%) millennials are fine with this trend and tradeoff, with TUR (57%) being the only nation that featured a majority of respondents being comfortable with this tradeoff in privacy and online experience. Does the world really understand what it is getting into with regard to online activity? Interestingly, NED, which has been the relatively conservative country in the study, revealed one in five millennial respondents (20%) believing that the age of privacy was not waning.