SlideShare a Scribd company logo
1 of 42
Download to read offline
IT Manager’s Eyes Only
october 2016
TOP SEC
Multiple Intelligence reports have
identified significant, sinister threats
to global email communication networks
from coordinated underworld cyber
criminals. The threat is real and
substantial. Immediate action is
recommended to avoid catastrophe.
TOP SEC
Email remains the most common and
prevalent form of communication
in the business world.
RADICATI.COM
The total number of worldwide email
users, including both business and
consumers, is projected to go from
over 2.5 billion in 2014 to over 2.8
billion in 2018.
RADICATI.COM
Business users send and receive on average
121 emails a day in 2014 (projected to be 140
emails a day by 2018)
In 2014, the majority of email traffic came from
the business world, which accounts for over 108.7
billion emails sent and received per day.
By 2018, business email will account for over 139.4
billion emails sent and received per day.
By the end of 2018, worldwide mobile email users are
expected to total over 2.2 billion.
RADICATI.COM
The rapid expansion of email as the
single biggest primary
business communication channel has
fuelled a counter culture in
security threats and data breaches.
Spam, malware, ransomware and
phishing are all rising.
Think about your own company when you
view the following slides…
of employees access personal email from their business
computer, more than double the level of authorised use.
PINECOMPUTERS.NET
The average cost of a
data breach for large
enterprises is $429,000,
and 88% of companies have
experienced some degree
of data loss.
of employees receive
unencrypted, risky
corporate data via
email or attachment.
People send and receive
an average of 15 email
attachments every day
(over 5,000 attachments
per year).
THEAMERICANGENIUS.COM
SYMANTEC.COM
Cyber criminals targeted 5 out of 6 large companies
using email attacks in 2014 (an increase of 40%).
SME businesses also saw an uptick, with attacks
increasing 26% and 30% respectively.
unsolicited messages contain a
malicious attachment or link.
WWW2.TRUSTWAVE.COM
28% of breaches result from poor passwords, and
another 28% from weak remote access security.
WWW2.TRUSTWAVE.COM
39% of passwords are eight characters, a length
that takes an average of one day to crack.
(Compare that to 10-character passwords, which
take an average of 591 days.)WWW2.TRUSTWAVE.COM
increase in total cost
over 2013 levels.
In 2014, the average
cost of an enterprise
data breach reached
$3.79 million, a
WWW-01.IBM.COM
www.symantec.com
An increase of 317 million new
pieces of malware were created.
There are over 1.7 billion pieces
of malware currently in circulation
that could infect your inbox.
Non-targeted attacks of malware
increased by 26% in 2014.
WWW.SYMANTEC.COM
WW.SYMANTEC.COMWWW.SYMANTEC.COM
YOU CANNOT DEPEND ON VIRTUAL SANDBOXING
TO OBSERVE AND DETECT MALWARE.
Certain malware like W32.Crisis, upon detecting
a virtual machine, will search for other
virtual machine images and infect them.
In 2014, up to 28% of all malware
was ‘virtual machine aware’.
WWW.SYMANTEC.COM
There was a 4,000% increase in crypto-ransomware attacks.
Ransomware attacks grew 113% in 2014.
WWW.SYMANTEC.COM
WWW.SYMANTEC.COM
In 2013, crypto-ransomware
accounted for approximately
0.2 percent of all ransomware
attacks. By the end of 2014
this figure grgew to 4 percent
WWW.SYMANTEC.COM
GETCYBERSAFE.GC.CA
PHISHING ATTACKS COST GLOBAL ORGANISATIONS
$4.5 BILLION IN LOSSES IN 2014.
EMC.COM
from 2010 to 2014.
Phishing attacks rose by
EMC.COM
of people globally can’t correctly
identify a sophisticated phishing email.
securityaffairs.co
phishing.org
Spear phishing file type
breakdown analysis 2014
WWW.SYMANTEC.COM
Risk ratio of spear
phishing attacks by
industry
The mining industry
was the most heavily
targeted in 2014, with
43 percent (1 in 2.3)
of mining organizations
being targeted at least
once during the year.
WWW.SYMANTEC.COM
WWW.SYMANTEC.COM
Individuals in sales/
marketing job roles
were the most targeted
in 2014, with 1 in 2.9
of them being targeted
at least once; this
is equivalent to 35%
of sales/marketing
personnel
Cybercriminals rely on an underground
online economy to buy and sell
services and malware and to fence stolen
credit cards and botnets.
CYBERCRIME HAS A 1,425%
RETURN ON INVESTMENT.
WWW.SYMANTEC.COM
45% of businesses have board or senior level
management who take only a partial role in security
matters. 9% do not partake at all.
IN MANY CASES, THE IT MANAGER MUST TAKE FULL
RESPONSIBILITY ON THEIR OWN.
trustwave.com
In 2013, 4 out of 5 IT professionals were pressured
to rollout IT projects despite security issues.
forbes.com
of decision makers are facing
pressure to release IT projects that
are not security ready.
TRUSTWAVE.COM
Defend against email threats.
Deploy an email security service,
with multiple safeguards including
anti-spam, anti-malware and content
filtering capabilities.
Secure email traffic content.
Block or flag all executable files
and all suspicious orunusual file
attachments, such as .cpl, .chm and
.lnk files. Create alternative
methods for file sharing.
Ensure email security service
can handle blended threats that
combine spam with links to
malicious websites.
Educate users, from the bottom ranks
all the way up to the C-suite, on
the nature of today’s email attacks
and conduct mock phishing exercises.
Consider upgrading your IT
email defences with Blockmail.
1.
2.
3.
4.
5.
50-56 Merrion Road Road,
Ballsbridge, Dublin 4. D04 V4K3, Ireland.
Telephone: +353 (0)1 426 3300
Fax: + 353 (0)1 466 0687
Topsec UK
Castle Hill House
12 Castle Hill, Windsor, SL4 1PD, United Kingdom
Telephone: + 44 (1784)725903
Topsec Canada
Suite 830, 5991 Spring Garden Road
Halifax, B3H 1Y6, Nova Scotia
Telephone: + 1 902 430 9340
Email:
For sales enquiries: sales@topsec.com For support
enquiries: support@topsec.com For DNS enquiries:
dns@topsec.com
DISCOVER MORE ABOUT HOW TO
COMBAT MALWARE AND SPAM WITH
OUR FREE EBOOK DOWNLOAD.
START YOUR FREE TRIAL TODAY
produced by
DOWNLOAD HERE

More Related Content

What's hot

What's hot (20)

5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
Proofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat Report
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMS
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security Deployment
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
Security/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and ComplianceSecurity/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and Compliance
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based AttacksESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Infographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threatsInfographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threats
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 

Similar to Topsec email security 2016

5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
ReadWrite
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Erik Ginalick
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
Ken Spencer Brown
 
Datto stateofthechannelransomwarereport2016 rh
Datto stateofthechannelransomwarereport2016 rhDatto stateofthechannelransomwarereport2016 rh
Datto stateofthechannelransomwarereport2016 rh
James Herold
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
CR Group
 

Similar to Topsec email security 2016 (20)

Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your Business
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-en
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
Internet security threat report 2013
Internet security threat report 2013Internet security threat report 2013
Internet security threat report 2013
 
Datto stateofthechannelransomwarereport2016 rh
Datto stateofthechannelransomwarereport2016 rhDatto stateofthechannelransomwarereport2016 rh
Datto stateofthechannelransomwarereport2016 rh
 
What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
 
B istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-usB istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-us
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
 

Recently uploaded

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Recently uploaded (20)

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
SHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions PresentationSHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions Presentation
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 

Topsec email security 2016

  • 1. IT Manager’s Eyes Only october 2016 TOP SEC
  • 2. Multiple Intelligence reports have identified significant, sinister threats to global email communication networks from coordinated underworld cyber criminals. The threat is real and substantial. Immediate action is recommended to avoid catastrophe. TOP SEC
  • 3. Email remains the most common and prevalent form of communication in the business world. RADICATI.COM
  • 4. The total number of worldwide email users, including both business and consumers, is projected to go from over 2.5 billion in 2014 to over 2.8 billion in 2018. RADICATI.COM
  • 5. Business users send and receive on average 121 emails a day in 2014 (projected to be 140 emails a day by 2018) In 2014, the majority of email traffic came from the business world, which accounts for over 108.7 billion emails sent and received per day. By 2018, business email will account for over 139.4 billion emails sent and received per day. By the end of 2018, worldwide mobile email users are expected to total over 2.2 billion. RADICATI.COM
  • 6. The rapid expansion of email as the single biggest primary business communication channel has fuelled a counter culture in security threats and data breaches.
  • 7. Spam, malware, ransomware and phishing are all rising.
  • 8. Think about your own company when you view the following slides…
  • 9. of employees access personal email from their business computer, more than double the level of authorised use. PINECOMPUTERS.NET
  • 10. The average cost of a data breach for large enterprises is $429,000, and 88% of companies have experienced some degree of data loss. of employees receive unencrypted, risky corporate data via email or attachment. People send and receive an average of 15 email attachments every day (over 5,000 attachments per year). THEAMERICANGENIUS.COM
  • 11. SYMANTEC.COM Cyber criminals targeted 5 out of 6 large companies using email attacks in 2014 (an increase of 40%). SME businesses also saw an uptick, with attacks increasing 26% and 30% respectively.
  • 12. unsolicited messages contain a malicious attachment or link. WWW2.TRUSTWAVE.COM
  • 13. 28% of breaches result from poor passwords, and another 28% from weak remote access security. WWW2.TRUSTWAVE.COM
  • 14. 39% of passwords are eight characters, a length that takes an average of one day to crack. (Compare that to 10-character passwords, which take an average of 591 days.)WWW2.TRUSTWAVE.COM
  • 15. increase in total cost over 2013 levels. In 2014, the average cost of an enterprise data breach reached $3.79 million, a WWW-01.IBM.COM
  • 17.
  • 18. An increase of 317 million new pieces of malware were created. There are over 1.7 billion pieces of malware currently in circulation that could infect your inbox. Non-targeted attacks of malware increased by 26% in 2014. WWW.SYMANTEC.COM
  • 20. YOU CANNOT DEPEND ON VIRTUAL SANDBOXING TO OBSERVE AND DETECT MALWARE. Certain malware like W32.Crisis, upon detecting a virtual machine, will search for other virtual machine images and infect them. In 2014, up to 28% of all malware was ‘virtual machine aware’. WWW.SYMANTEC.COM
  • 21.
  • 22. There was a 4,000% increase in crypto-ransomware attacks. Ransomware attacks grew 113% in 2014. WWW.SYMANTEC.COM
  • 24. In 2013, crypto-ransomware accounted for approximately 0.2 percent of all ransomware attacks. By the end of 2014 this figure grgew to 4 percent WWW.SYMANTEC.COM
  • 25.
  • 27. PHISHING ATTACKS COST GLOBAL ORGANISATIONS $4.5 BILLION IN LOSSES IN 2014. EMC.COM
  • 28. from 2010 to 2014. Phishing attacks rose by EMC.COM
  • 29. of people globally can’t correctly identify a sophisticated phishing email. securityaffairs.co
  • 31.
  • 32. Spear phishing file type breakdown analysis 2014 WWW.SYMANTEC.COM
  • 33. Risk ratio of spear phishing attacks by industry The mining industry was the most heavily targeted in 2014, with 43 percent (1 in 2.3) of mining organizations being targeted at least once during the year. WWW.SYMANTEC.COM
  • 34. WWW.SYMANTEC.COM Individuals in sales/ marketing job roles were the most targeted in 2014, with 1 in 2.9 of them being targeted at least once; this is equivalent to 35% of sales/marketing personnel
  • 35. Cybercriminals rely on an underground online economy to buy and sell services and malware and to fence stolen credit cards and botnets. CYBERCRIME HAS A 1,425% RETURN ON INVESTMENT.
  • 37.
  • 38. 45% of businesses have board or senior level management who take only a partial role in security matters. 9% do not partake at all. IN MANY CASES, THE IT MANAGER MUST TAKE FULL RESPONSIBILITY ON THEIR OWN. trustwave.com
  • 39. In 2013, 4 out of 5 IT professionals were pressured to rollout IT projects despite security issues. forbes.com
  • 40. of decision makers are facing pressure to release IT projects that are not security ready. TRUSTWAVE.COM
  • 41. Defend against email threats. Deploy an email security service, with multiple safeguards including anti-spam, anti-malware and content filtering capabilities. Secure email traffic content. Block or flag all executable files and all suspicious orunusual file attachments, such as .cpl, .chm and .lnk files. Create alternative methods for file sharing. Ensure email security service can handle blended threats that combine spam with links to malicious websites. Educate users, from the bottom ranks all the way up to the C-suite, on the nature of today’s email attacks and conduct mock phishing exercises. Consider upgrading your IT email defences with Blockmail. 1. 2. 3. 4. 5.
  • 42. 50-56 Merrion Road Road, Ballsbridge, Dublin 4. D04 V4K3, Ireland. Telephone: +353 (0)1 426 3300 Fax: + 353 (0)1 466 0687 Topsec UK Castle Hill House 12 Castle Hill, Windsor, SL4 1PD, United Kingdom Telephone: + 44 (1784)725903 Topsec Canada Suite 830, 5991 Spring Garden Road Halifax, B3H 1Y6, Nova Scotia Telephone: + 1 902 430 9340 Email: For sales enquiries: sales@topsec.com For support enquiries: support@topsec.com For DNS enquiries: dns@topsec.com DISCOVER MORE ABOUT HOW TO COMBAT MALWARE AND SPAM WITH OUR FREE EBOOK DOWNLOAD. START YOUR FREE TRIAL TODAY produced by DOWNLOAD HERE