SlideShare a Scribd company logo
1 of 12
The Importance of
Cybersecurity in 2017
Cybercrime is now a $ 600 billion
opportunity. It’s a well-organized business
affecting both IT corporations and small
companies. In fact, hackers consider small
and medium-sized businesses an easier
target due to weak defense systems.
All rights reserved © R-Style Lab 2017
THESE ARE CYBERCRIME TOP TARGETS
24.8
11.9
9.3
4.2 4.1 3.4 3.2
1.9
0
5
10
15
20
25
30
(%)
All rights reserved © R-Style Lab 2017
SOME SHOCKING CYBERSECURITY STATS…
• Every day, 200 thousand new malware samples
are captured;
• Through 2016, 4 thousand ransomware attacks
took place on a daily basis;
• Over 70% of companies affected by ransomware
paid hackers to regain access to customer
records last year. 20% of those had to pay over $
40 thousand;
• More than 59% of infections came from emails.
78% of employees clicked on embedded links
despite being aware of security risks.
All rights reserved © R-Style Lab 2017
YET, CYBERSECURITY THREATS ARE
IGNORED
52
31 31
0
10
20
30
40
50
60
No changes planned
Making changes to security
plans
Not sure
Business Security Strategy for 2017
(% of companies surveyed)
All rights reserved © R-Style Lab 2017
TOP CAUSES OF ATTACKS & DATA BREACHES
48
41
35
27
5
32
0
10
20
30
40
50
60
Employee
negligence
3rd-party
mistakes
System error Hacker
attacks
Malicious
insider
Unidentified
(%)
All rights reserved © R-Style Lab 2017
COMMON TYPES OF BUSINESS
CYBERATTACKS
49
43
35
26 25
21
11
2
0
10
20
30
40
50
60
(%)
In 2017, ransomware attacks are expected to grow by 250%,
causing over $ 5 billion in damage
All rights reserved © R-Style Lab 2017
A typical cyberattack victim
is denied access to computers within a
business network & file servers.
Each hour of downtime will cost your small
business over $ 8 thousand. Unless you
consult experienced software developers &
treat cybersecurity seriously, tomorrow
cybercrime might affect you.
All rights reserved © R-Style Lab 2017
HERE’S HOW TO SECURE YOUR IT
INFRASTRUCTURE (pt. 1)
• Create a corporate security policy regarding
acceptable use, password generation and
defenses against social engineering (and make
sure your employees adhere to it!);
• Encrypt & backup business data (copy of
backup data should be kept off-premises);
• Conduct employee screening to detect
malicious insiders;
• Standardize security protocols to address the
Bring Your Own Device challenge;
All rights reserved © R-Style Lab 2017
HERE’S HOW TO SECURE YOUR IT
INFRASTRUCTURE (pt. 2)
• Maintain security patches and simplify
firmware updates (cybercriminals always look
for vulnerabilities and come up with new hacking
techniques);
• Design software/hardware products with
security in mind (from choosing a secure
website CMS to implementing reliable IoT
messaging protocols, security should be your top
priority);
• Educate users (only 31% of IoT adopters, for
example, update to the latest version of
firmware; most users continue to use default
passwords). All rights reserved © R-Style Lab 2017
The r-stylelab.com team urges you to
follow cybersecurity best practices,
keep detailed logs and report attacks to
authorities. Together we can make
cyberspace a safer place!
All rights reserved © R-Style Lab 2017
REPRESENTATIVE OFFICE
425 Market Street,
San Francisco, CA, 94105
+1 888 414 6445
ask@r-stylelab.com
DEVELOPMENT FACILITIES
76A Masherova Ave,
220035, Minsk, Belarus
+375 17 306 48 42
+375 29 348 44 44
SOURCES:
https://smallbiztrends.com/2017/01/cyber-security-statistics-small-business.html
https://www.forbes.com/sites/kateharrison/2016/05/03/the-best-practices-in-cyber-security-
for-small-to-medium-sized-businesses/#653fc4697346
http://r-stylelab.com/company/blog/iot/iot-security-challenges-where-do-we-go-from-here
https://smallbiztrends.com/2017/01/cyber-security-statistics-small-business.html
https://www.observeit.com/blog/10-best-practices-cyber-security-2016
https://blog.barkly.com/cyber-security-statistics-2017
All rights reserved © R-Style Lab 2017

More Related Content

What's hot

What's hot (20)

cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 

Similar to The Importance of Cybersecurity in 2017

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
OnRamp
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 

Similar to The Importance of Cybersecurity in 2017 (20)

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
The 2018 Threatscape
The 2018 ThreatscapeThe 2018 Threatscape
The 2018 Threatscape
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplace
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cure
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
Presentation gdl
Presentation gdlPresentation gdl
Presentation gdl
 
Best Security Practices for a Web Application
Best Security Practices for a Web Application Best Security Practices for a Web Application
Best Security Practices for a Web Application
 
Cyber Resilency VANCOUVER, BC Nov 2017
Cyber Resilency VANCOUVER, BC  Nov 2017  Cyber Resilency VANCOUVER, BC  Nov 2017
Cyber Resilency VANCOUVER, BC Nov 2017
 
Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 

More from R-Style Lab

More from R-Style Lab (17)

R-Style Lab: Smart Solutions for Healthcare Providers
R-Style Lab: Smart Solutions for Healthcare ProvidersR-Style Lab: Smart Solutions for Healthcare Providers
R-Style Lab: Smart Solutions for Healthcare Providers
 
R-Style Lab Web Development Portfolio
R-Style Lab Web Development PortfolioR-Style Lab Web Development Portfolio
R-Style Lab Web Development Portfolio
 
R-Style Lab UI & UX Design Portfolio
R-Style Lab UI & UX Design PortfolioR-Style Lab UI & UX Design Portfolio
R-Style Lab UI & UX Design Portfolio
 
Comprehensive IoT Development Services to Empower Your Business
Comprehensive IoT Development Services to Empower Your BusinessComprehensive IoT Development Services to Empower Your Business
Comprehensive IoT Development Services to Empower Your Business
 
R-Style Lab: Company, Processes, Expertise
R-Style Lab: Company, Processes, ExpertiseR-Style Lab: Company, Processes, Expertise
R-Style Lab: Company, Processes, Expertise
 
How to Leverage IoT for Business Growth: Infographic
How to Leverage IoT for Business Growth: InfographicHow to Leverage IoT for Business Growth: Infographic
How to Leverage IoT for Business Growth: Infographic
 
Internet of Things in Business: Applications & Potential Benefits
Internet of Things in Business: Applications & Potential BenefitsInternet of Things in Business: Applications & Potential Benefits
Internet of Things in Business: Applications & Potential Benefits
 
How to Sell Mobile App Idea?
How to Sell Mobile App Idea?How to Sell Mobile App Idea?
How to Sell Mobile App Idea?
 
Web Development Trends to Watch in 2018
Web Development Trends to Watch in 2018Web Development Trends to Watch in 2018
Web Development Trends to Watch in 2018
 
Top 4 VR Business Use Cases
Top 4 VR Business Use CasesTop 4 VR Business Use Cases
Top 4 VR Business Use Cases
 
IoT Impact on Business
IoT Impact on BusinessIoT Impact on Business
IoT Impact on Business
 
iOS vs Android by Numbers
iOS vs Android by NumbersiOS vs Android by Numbers
iOS vs Android by Numbers
 
5 Steps to Mobile Game Success
5 Steps to Mobile Game Success5 Steps to Mobile Game Success
5 Steps to Mobile Game Success
 
How to Meet Google Play Requirements?
How to Meet Google Play Requirements?How to Meet Google Play Requirements?
How to Meet Google Play Requirements?
 
How to Get App Store Approval?
How to Get App Store Approval?How to Get App Store Approval?
How to Get App Store Approval?
 
Complete guide to outsourcing software development
Complete guide to outsourcing software developmentComplete guide to outsourcing software development
Complete guide to outsourcing software development
 
Mobile Apps for Small Businesses - Success Strategy
Mobile Apps for Small Businesses - Success StrategyMobile Apps for Small Businesses - Success Strategy
Mobile Apps for Small Businesses - Success Strategy
 

Recently uploaded

Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 

Recently uploaded (20)

%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 

The Importance of Cybersecurity in 2017

  • 2. Cybercrime is now a $ 600 billion opportunity. It’s a well-organized business affecting both IT corporations and small companies. In fact, hackers consider small and medium-sized businesses an easier target due to weak defense systems. All rights reserved © R-Style Lab 2017
  • 3. THESE ARE CYBERCRIME TOP TARGETS 24.8 11.9 9.3 4.2 4.1 3.4 3.2 1.9 0 5 10 15 20 25 30 (%) All rights reserved © R-Style Lab 2017
  • 4. SOME SHOCKING CYBERSECURITY STATS… • Every day, 200 thousand new malware samples are captured; • Through 2016, 4 thousand ransomware attacks took place on a daily basis; • Over 70% of companies affected by ransomware paid hackers to regain access to customer records last year. 20% of those had to pay over $ 40 thousand; • More than 59% of infections came from emails. 78% of employees clicked on embedded links despite being aware of security risks. All rights reserved © R-Style Lab 2017
  • 5. YET, CYBERSECURITY THREATS ARE IGNORED 52 31 31 0 10 20 30 40 50 60 No changes planned Making changes to security plans Not sure Business Security Strategy for 2017 (% of companies surveyed) All rights reserved © R-Style Lab 2017
  • 6. TOP CAUSES OF ATTACKS & DATA BREACHES 48 41 35 27 5 32 0 10 20 30 40 50 60 Employee negligence 3rd-party mistakes System error Hacker attacks Malicious insider Unidentified (%) All rights reserved © R-Style Lab 2017
  • 7. COMMON TYPES OF BUSINESS CYBERATTACKS 49 43 35 26 25 21 11 2 0 10 20 30 40 50 60 (%) In 2017, ransomware attacks are expected to grow by 250%, causing over $ 5 billion in damage All rights reserved © R-Style Lab 2017
  • 8. A typical cyberattack victim is denied access to computers within a business network & file servers. Each hour of downtime will cost your small business over $ 8 thousand. Unless you consult experienced software developers & treat cybersecurity seriously, tomorrow cybercrime might affect you. All rights reserved © R-Style Lab 2017
  • 9. HERE’S HOW TO SECURE YOUR IT INFRASTRUCTURE (pt. 1) • Create a corporate security policy regarding acceptable use, password generation and defenses against social engineering (and make sure your employees adhere to it!); • Encrypt & backup business data (copy of backup data should be kept off-premises); • Conduct employee screening to detect malicious insiders; • Standardize security protocols to address the Bring Your Own Device challenge; All rights reserved © R-Style Lab 2017
  • 10. HERE’S HOW TO SECURE YOUR IT INFRASTRUCTURE (pt. 2) • Maintain security patches and simplify firmware updates (cybercriminals always look for vulnerabilities and come up with new hacking techniques); • Design software/hardware products with security in mind (from choosing a secure website CMS to implementing reliable IoT messaging protocols, security should be your top priority); • Educate users (only 31% of IoT adopters, for example, update to the latest version of firmware; most users continue to use default passwords). All rights reserved © R-Style Lab 2017
  • 11. The r-stylelab.com team urges you to follow cybersecurity best practices, keep detailed logs and report attacks to authorities. Together we can make cyberspace a safer place! All rights reserved © R-Style Lab 2017
  • 12. REPRESENTATIVE OFFICE 425 Market Street, San Francisco, CA, 94105 +1 888 414 6445 ask@r-stylelab.com DEVELOPMENT FACILITIES 76A Masherova Ave, 220035, Minsk, Belarus +375 17 306 48 42 +375 29 348 44 44 SOURCES: https://smallbiztrends.com/2017/01/cyber-security-statistics-small-business.html https://www.forbes.com/sites/kateharrison/2016/05/03/the-best-practices-in-cyber-security- for-small-to-medium-sized-businesses/#653fc4697346 http://r-stylelab.com/company/blog/iot/iot-security-challenges-where-do-we-go-from-here https://smallbiztrends.com/2017/01/cyber-security-statistics-small-business.html https://www.observeit.com/blog/10-best-practices-cyber-security-2016 https://blog.barkly.com/cyber-security-statistics-2017 All rights reserved © R-Style Lab 2017