SlideShare une entreprise Scribd logo
1  sur  17
5
CYBERSECURITY
THREATS IN PUBLIC SECTOR
1
Introduction
2
Public Sector is amongst the
favorite of hackers. As the public
sector hoards valuable and
sensitive information of citizens,
it makes them an attractive
target for cyber criminals.
Data breaches in Public Sector
results in exposing massive
amounts of data which is
usually confidential in nature.
Major Threats Faced by Public Sector
3
Data loss
Insider and
Privilege Misuse
Cyber Espionage
Phishing
Ransomware
Web Application
AttacksDenial of Service
Malware
Attacks
Malicious Insiders
Payment Card
Skimmers
Point of Sale
Intrusion
Crimeware
Lost and stolen asset
Social Error
Trojan
Human
Error
Spyware
Virus
IT Risks in Public Sector
41%
Personal data
As per SecurityScorecard Research Report 2017:
Public Sector received one of the lowest security
scores, when compared to 17 other major
industries.
4
33%of organizations in
Public Sector had
compliance issues
in 2016.
Data compromised
in Public Sector
88%of IT operations
teams are at least
partially responsible
for data breaches or
security incidents in
Public Sector.
Source: Netwrix, Cisco Annual Cybersecurity
Report 2017
75%of organizations in
Public Sector do
not have any
separate
information
security function.
“
41%
Secrets
14%
Credentials
9%
Medical data
What Statistics have to say?
• 72% Public Sector entities worldwide had their security compromised in 2016.
• Only 14% of Public Sector organizations consider themselves to be well-protected against cyber threats.
• 100% of IT specialists working for Public Sector agencies worldwide, says employees are the biggest threat to security.
• 21.10% of overall data records were stolen or lost in Public Sector in the year 2016.
• Public sector entities were the third most prevalent industry to be breached (12%) in 2016.
• Public sector organizations worldwide experienced 269 data breach incidents in the year 2016.
• 43% of Public Sector IT professionals said they investigated security incidents that involved insider misuse.
• 6% of overall external vulnerabilities were found in Public Sector in 2016.
Source: Netwrix 2017, BLI 5
TOP 5 CYBERSECURITY
THREATS IN PUBLIC SECTOR
6
RANSOMWARE
Source: Verizon DBIR 2017, Bitsight
Insights
Ransomware is a malware
that works by encrypting
information and then
demanding ransom to decrypt
it. Public Sector is one major
target of ransomware attacks
becasue of the large volumes
of citizen's sensitive
information.
99% of malware
sent via email or
webserver.
7
21,239
Total number of security
incidents in Public Sector
in 2016.
“
96% of Public
Sector data has
been
compromised
during multiple
ransomware
attacks in 2016.
5.9% of Public
Sector entities were
hit by ransomware
attacks in 2016,
which makes Public
Sector exhibites the
second highest hit
rate of ransomware
attacks after
Education industry.
INSIDER THREAT
100% of
Public Sector
entities see
their own
employees as
the biggest
threat to
security.
Source: Verizon DBIR 2017
Insider Threat: A malicious threat to the
organization that comes from people
within the organization.
Breaches in Public Sector often
involves employees accessing sensitive
information either maliciously or
unintentionally, in a way that could
affect the entities.
Insider threat can be categorized as:
• Human Error
• Privilege Misuse
• Data Theft
8
57% & 14%
Security
Incidents
Data
Breaches
“Privilege misuse as insider threats in
Public Sector entities caused:
7417
Security
Incidents
58
Breaches
are caused by human errors
as insider threats in Public
Sector entities.
DISTRIBUTED DENIAL
OF SERVICE (DDoS) 617
security
incidents
were caused
by DDoS in
Public Sector.
Source: Verizon DBIR 2017
DDoS attacks are intended to
compromise the availability of
networks and systems by
overwhelming the traffic, resulting in
perfomance degradation or
interruption of services.
Public sector experienced a huge
number of DDoS attacks.
9
“In August 2016, the
Australian Census
website received four
DDoS attacks by
overseas hackers.
Millions of Australians
were unable to fill out
the mandatory Census
online. The hackers
exposed names and
addresses of the users,
which were retained by
the organization later.
CYBER ESPIONAGE
Source: Verizon DBIR 2017
Cyber Espionage, an incident pattern
which includes unauthorized network
or system access linked to state-
affiliated actors and/or exhibiting
the motive of espionage.
Among all other tactics of cyber
attacks, Phishing is the most
consistent tactic used by cyber
criminals during cyber-espionage.
10
41% of data
breaches in
Public Sector
were related to
cyber
espionage.
“
According to Verizon DBIR 2017:
Cyber Espionage is
among the
greatest threat to
Public Sector
entities.
112security
incidents and
breaches were
caused by cyber-
espionage in Public
Sector in the year
2016.
More than 90%
of data breaches
were attributed to
state-affiliated
groups.
PHISHING
As per the Verizon DBIR 2017:
9.23% people clicked on
phishing mails in Public Sector.
Source: Verizon DBIR 2017
Malicious payloads are
commonly delivered via:
Phishing is a process of
contacting a person
through email, message or
call where the receiver is
tricked to leak sensitive
data such as personally
identifiable information.
100% of phishing emails
comprise of ransomware or
malicious software.
91%of
cyber attacks
start with a
phishing
email.
11
“
73%
Email
13%
Drive-by-
download
Average click rate
of phishing emails
in Public Sector is
10.66%.
Helps mitigate all such security threats in the public sector with its range of
Dynamic, Scalable, and Future Ready solutions:
SEQRITE Endpoint Security
SEQRITE Unified Threat Management Solution (TERMINATOR)
SEQRITE Mobile Device Management
SEQRITE Data Loss Prevention
1
2
Endpoint Security FEATURES
PATCH MANAGEMENT
Enables IT administrators to check and
install missing security patches for all
applications installed on enterprise endpoints
from a centrally managed console.
WEB SECURITY
Automatically blocks websites infected with
malware or designed for phishing attacks.
APPLICATION CONTROL
Categories of applications can be authorized or
unauthorized from being executed within the
network.
DATA BACKUP AND RESTORE TOOL
Automatically and periodically (multiple times
a day), takes a backup of all important and
well-known file formats like PDF and Microsoft
Office files that are present on a computer.
RISKS MITIGATED
RANSOMWARE ATTACKS
INSIDER THREATS
CORE PROTECTION (IDS/IPS & FIREWALL)
IDS/IPS blocks threats that exploit software
vulnerabilities and Firewall thwarts malicious
attempts to access the corporate network.
BEHAVIOR DETECTION
Detects and blocks unknown viruses and
malware in real-time.
INFECTED WEBSITES
PHISHING ATTACKSINFECTED EXTERNAL DEVICES
SECURITY VULNERABILITIES
1
3
Data Loss Prevention
ADVANCED DEVICE CONTROL
- Configure access policies for more than 25 device
types.
- Blocks unverified devices.
- Prevents autorun infections.
ENHANCED PRIVACY PROTECTION & COMPLIANCE
- Identifies Office documents based on their origin.
- Prevents data leakage propagated by worms, Trojans,
and other malware threats.
- Issues regular notifications to reinforce user behavior
on data security.
LOWER COMPLEXITY & COST OF DEPLOYMENT
- Easy integration with existing Seqrite EPS.
- Defines DLP security polices and reports across multiple
endpoints in scattered locations.
- Centralized management and monitoring of crucial business
data.
CONTENT AWARE PROTECTION
- Monitors all actions on confidential files.
- Instantly notifies admins about unauthorized data leakage.
- Ensures that no confidential data leaves the organization.
- TARGETED ATTACKS
- HUMAN ERROR
- USB DRIVES
- WEB EMAIL
DATA LEAKAGE caused by:
RISKS MITIGATED
FEATURES
1
- BLUETOOTH
- CLOUD STORAGE
TERMINATOR
GATEWAY ANTIVIRUS
Scans all incoming and outgoing network traffic
at the gateway level. Augments existing virus
solutions by reducing the window of
vulnerability (WoV).
FIREWALL
Admins can permit or block access for traffic
between internal and external networks
based on enterprise compliance policies.
VIRTUAL PRIVATE NETWORK
Provides IT administrators with a means for
secure communications between the
company's remote users and for building site-to-
site connections.
IDS / IPS
Scrutinizes network traffic in real-time and
prevents a broad range of DoS and DDoS
attacks before they penetrate the network.
DoS & DDoS ATTACKS
INTERNET DOWNTIME
GATEWAY MAIL PROTECTION
Scans incoming/outgoing emails or attachments
at the gateway level to block spam and phishing
emails before they enter the network.
CONTENT FILTERING
Allows blocking of non-business related websites
including streaming media sites, downloads,
instant messaging, etc., in order to reduce
unnecessary load on enterprise bandwidth.
MALICIOUS INTERNET TRAFFIC
MALICIOUS EMAILSMAN-in-the-MIDDLE ATTACKS
ADVANCED PERSISTENT THREATS
FEATURES
RISKS MITIGATED
1
5
MDM
APPLICATION CONTROL
Apps can be remotely managed/ installed/
blocked in order to maintain policy compliance
and productivity within the network.
VIRTUAL FENCING
Preset virtual boundaries that restrict device
usage and functionality. These boundaries can
be triggered by geolocation-based, time-based
or Wi-Fi network-based data.
UNIFIED MANAGEMENT CONSOLE
Manage and synchronize all connected devices
through a centralized graphical interface.
NETWORK DATA MONITORING
Admins can view details of Internet data used
over mobile networks or Wi-Fi. They can also
monitor all incoming and outgoing calls and
SMSs on enterprise mobile devices.
DATA THEFT FROM LOST/
STOLEN MOBILE PHONES
ANTI-THEFT
Prevents misuse of lost/stolen mobile phones by
remotely tracking and locking them. Also prevents
data breach by remotely erasing the phone’s data.
INTERNET THREATS
JAILBREAKING/ ROOTING
OF MOBILE DEVICES
MALICIOUS MOBILE APPS
SECURITY MANAGEMENT
Features such as browsing protection, web
filtering, anti-theft, and geolocation tracking
ensure the safety of enterprise devices.
MOBILE MALWARE
BAD SECURITY HYGIENE
FEATURES
RISKS MITIGATED
1
6
17
THANK YOU
All Intellectual Property Right(s) including trademark(s), logo(s) and copyright(s) are
properties of their respective owners. Copyright ©2017 Quick Heal Technologies Ltd.
All rights reserved.

Contenu connexe

Tendances

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Securitykailash shaw
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh WebinarArrow ECS UK
 
Healthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemCheapSSLsecurity
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web ThreatsKim Jensen
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityMastel Indonesia
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1newbie2019
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresIOSR Journals
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Ainsha Noordin (Umie)
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Netpluz Asia Pte Ltd
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Carol Montgomery Adams
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - CybersecurityAbhilashYadav14
 

Tendances (20)

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 
Healthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend Them
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive Measures
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
 
Security/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and ComplianceSecurity/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and Compliance
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 

Similaire à 5 Cybersecurity threats in Public Sector

F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalShallu Behar-Sheehan FCIM
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...cyberprosocial
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...cyberprosocial
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data SecurityRazor Technology
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptxsakshiyad2611
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisIJERD Editor
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 

Similaire à 5 Cybersecurity threats in Public Sector (20)

Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Information security
Information securityInformation security
Information security
 
Task 3
Task 3Task 3
Task 3
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 

Plus de Seqrite

Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesSeqrite
 
UTM & Next-Gen Firewall Solution: What's the difference?
UTM & Next-Gen Firewall Solution: What's the difference?UTM & Next-Gen Firewall Solution: What's the difference?
UTM & Next-Gen Firewall Solution: What's the difference?Seqrite
 
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Seqrite
 
[Infographic] How ransomware gets into your system
[Infographic] How ransomware gets into your system[Infographic] How ransomware gets into your system
[Infographic] How ransomware gets into your systemSeqrite
 
[Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry [Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry Seqrite
 
7 Cyber attacks that shook the world
7 Cyber attacks that shook the world7 Cyber attacks that shook the world
7 Cyber attacks that shook the worldSeqrite
 

Plus de Seqrite (6)

Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized Businesses
 
UTM & Next-Gen Firewall Solution: What's the difference?
UTM & Next-Gen Firewall Solution: What's the difference?UTM & Next-Gen Firewall Solution: What's the difference?
UTM & Next-Gen Firewall Solution: What's the difference?
 
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
 
[Infographic] How ransomware gets into your system
[Infographic] How ransomware gets into your system[Infographic] How ransomware gets into your system
[Infographic] How ransomware gets into your system
 
[Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry [Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry
 
7 Cyber attacks that shook the world
7 Cyber attacks that shook the world7 Cyber attacks that shook the world
7 Cyber attacks that shook the world
 

Dernier

VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...SUHANI PANDEY
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...tanu pandey
 
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...ranjana rawat
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processNAP Global Network
 
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORSPPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORSgovindsharma81649
 
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...SUHANI PANDEY
 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisChristina Parmionova
 
Top Rated Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...aartirawatdelhi
 
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...robinsonayot
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCNAP Global Network
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...tanu pandey
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'NAP Global Network
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)NAP Global Network
 
Government e Marketplace GeM Presentation
Government e Marketplace GeM PresentationGovernment e Marketplace GeM Presentation
Government e Marketplace GeM Presentationgememarket11
 

Dernier (20)

VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
 
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORSPPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
 
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental Crisis
 
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
 
Top Rated Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
 
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...
 
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
 
Government e Marketplace GeM Presentation
Government e Marketplace GeM PresentationGovernment e Marketplace GeM Presentation
Government e Marketplace GeM Presentation
 

5 Cybersecurity threats in Public Sector

  • 2. Introduction 2 Public Sector is amongst the favorite of hackers. As the public sector hoards valuable and sensitive information of citizens, it makes them an attractive target for cyber criminals. Data breaches in Public Sector results in exposing massive amounts of data which is usually confidential in nature.
  • 3. Major Threats Faced by Public Sector 3 Data loss Insider and Privilege Misuse Cyber Espionage Phishing Ransomware Web Application AttacksDenial of Service Malware Attacks Malicious Insiders Payment Card Skimmers Point of Sale Intrusion Crimeware Lost and stolen asset Social Error Trojan Human Error Spyware Virus
  • 4. IT Risks in Public Sector 41% Personal data As per SecurityScorecard Research Report 2017: Public Sector received one of the lowest security scores, when compared to 17 other major industries. 4 33%of organizations in Public Sector had compliance issues in 2016. Data compromised in Public Sector 88%of IT operations teams are at least partially responsible for data breaches or security incidents in Public Sector. Source: Netwrix, Cisco Annual Cybersecurity Report 2017 75%of organizations in Public Sector do not have any separate information security function. “ 41% Secrets 14% Credentials 9% Medical data
  • 5. What Statistics have to say? • 72% Public Sector entities worldwide had their security compromised in 2016. • Only 14% of Public Sector organizations consider themselves to be well-protected against cyber threats. • 100% of IT specialists working for Public Sector agencies worldwide, says employees are the biggest threat to security. • 21.10% of overall data records were stolen or lost in Public Sector in the year 2016. • Public sector entities were the third most prevalent industry to be breached (12%) in 2016. • Public sector organizations worldwide experienced 269 data breach incidents in the year 2016. • 43% of Public Sector IT professionals said they investigated security incidents that involved insider misuse. • 6% of overall external vulnerabilities were found in Public Sector in 2016. Source: Netwrix 2017, BLI 5
  • 6. TOP 5 CYBERSECURITY THREATS IN PUBLIC SECTOR 6
  • 7. RANSOMWARE Source: Verizon DBIR 2017, Bitsight Insights Ransomware is a malware that works by encrypting information and then demanding ransom to decrypt it. Public Sector is one major target of ransomware attacks becasue of the large volumes of citizen's sensitive information. 99% of malware sent via email or webserver. 7 21,239 Total number of security incidents in Public Sector in 2016. “ 96% of Public Sector data has been compromised during multiple ransomware attacks in 2016. 5.9% of Public Sector entities were hit by ransomware attacks in 2016, which makes Public Sector exhibites the second highest hit rate of ransomware attacks after Education industry.
  • 8. INSIDER THREAT 100% of Public Sector entities see their own employees as the biggest threat to security. Source: Verizon DBIR 2017 Insider Threat: A malicious threat to the organization that comes from people within the organization. Breaches in Public Sector often involves employees accessing sensitive information either maliciously or unintentionally, in a way that could affect the entities. Insider threat can be categorized as: • Human Error • Privilege Misuse • Data Theft 8 57% & 14% Security Incidents Data Breaches “Privilege misuse as insider threats in Public Sector entities caused: 7417 Security Incidents 58 Breaches are caused by human errors as insider threats in Public Sector entities.
  • 9. DISTRIBUTED DENIAL OF SERVICE (DDoS) 617 security incidents were caused by DDoS in Public Sector. Source: Verizon DBIR 2017 DDoS attacks are intended to compromise the availability of networks and systems by overwhelming the traffic, resulting in perfomance degradation or interruption of services. Public sector experienced a huge number of DDoS attacks. 9 “In August 2016, the Australian Census website received four DDoS attacks by overseas hackers. Millions of Australians were unable to fill out the mandatory Census online. The hackers exposed names and addresses of the users, which were retained by the organization later.
  • 10. CYBER ESPIONAGE Source: Verizon DBIR 2017 Cyber Espionage, an incident pattern which includes unauthorized network or system access linked to state- affiliated actors and/or exhibiting the motive of espionage. Among all other tactics of cyber attacks, Phishing is the most consistent tactic used by cyber criminals during cyber-espionage. 10 41% of data breaches in Public Sector were related to cyber espionage. “ According to Verizon DBIR 2017: Cyber Espionage is among the greatest threat to Public Sector entities. 112security incidents and breaches were caused by cyber- espionage in Public Sector in the year 2016. More than 90% of data breaches were attributed to state-affiliated groups.
  • 11. PHISHING As per the Verizon DBIR 2017: 9.23% people clicked on phishing mails in Public Sector. Source: Verizon DBIR 2017 Malicious payloads are commonly delivered via: Phishing is a process of contacting a person through email, message or call where the receiver is tricked to leak sensitive data such as personally identifiable information. 100% of phishing emails comprise of ransomware or malicious software. 91%of cyber attacks start with a phishing email. 11 “ 73% Email 13% Drive-by- download Average click rate of phishing emails in Public Sector is 10.66%.
  • 12. Helps mitigate all such security threats in the public sector with its range of Dynamic, Scalable, and Future Ready solutions: SEQRITE Endpoint Security SEQRITE Unified Threat Management Solution (TERMINATOR) SEQRITE Mobile Device Management SEQRITE Data Loss Prevention 1 2
  • 13. Endpoint Security FEATURES PATCH MANAGEMENT Enables IT administrators to check and install missing security patches for all applications installed on enterprise endpoints from a centrally managed console. WEB SECURITY Automatically blocks websites infected with malware or designed for phishing attacks. APPLICATION CONTROL Categories of applications can be authorized or unauthorized from being executed within the network. DATA BACKUP AND RESTORE TOOL Automatically and periodically (multiple times a day), takes a backup of all important and well-known file formats like PDF and Microsoft Office files that are present on a computer. RISKS MITIGATED RANSOMWARE ATTACKS INSIDER THREATS CORE PROTECTION (IDS/IPS & FIREWALL) IDS/IPS blocks threats that exploit software vulnerabilities and Firewall thwarts malicious attempts to access the corporate network. BEHAVIOR DETECTION Detects and blocks unknown viruses and malware in real-time. INFECTED WEBSITES PHISHING ATTACKSINFECTED EXTERNAL DEVICES SECURITY VULNERABILITIES 1 3
  • 14. Data Loss Prevention ADVANCED DEVICE CONTROL - Configure access policies for more than 25 device types. - Blocks unverified devices. - Prevents autorun infections. ENHANCED PRIVACY PROTECTION & COMPLIANCE - Identifies Office documents based on their origin. - Prevents data leakage propagated by worms, Trojans, and other malware threats. - Issues regular notifications to reinforce user behavior on data security. LOWER COMPLEXITY & COST OF DEPLOYMENT - Easy integration with existing Seqrite EPS. - Defines DLP security polices and reports across multiple endpoints in scattered locations. - Centralized management and monitoring of crucial business data. CONTENT AWARE PROTECTION - Monitors all actions on confidential files. - Instantly notifies admins about unauthorized data leakage. - Ensures that no confidential data leaves the organization. - TARGETED ATTACKS - HUMAN ERROR - USB DRIVES - WEB EMAIL DATA LEAKAGE caused by: RISKS MITIGATED FEATURES 1 - BLUETOOTH - CLOUD STORAGE
  • 15. TERMINATOR GATEWAY ANTIVIRUS Scans all incoming and outgoing network traffic at the gateway level. Augments existing virus solutions by reducing the window of vulnerability (WoV). FIREWALL Admins can permit or block access for traffic between internal and external networks based on enterprise compliance policies. VIRTUAL PRIVATE NETWORK Provides IT administrators with a means for secure communications between the company's remote users and for building site-to- site connections. IDS / IPS Scrutinizes network traffic in real-time and prevents a broad range of DoS and DDoS attacks before they penetrate the network. DoS & DDoS ATTACKS INTERNET DOWNTIME GATEWAY MAIL PROTECTION Scans incoming/outgoing emails or attachments at the gateway level to block spam and phishing emails before they enter the network. CONTENT FILTERING Allows blocking of non-business related websites including streaming media sites, downloads, instant messaging, etc., in order to reduce unnecessary load on enterprise bandwidth. MALICIOUS INTERNET TRAFFIC MALICIOUS EMAILSMAN-in-the-MIDDLE ATTACKS ADVANCED PERSISTENT THREATS FEATURES RISKS MITIGATED 1 5
  • 16. MDM APPLICATION CONTROL Apps can be remotely managed/ installed/ blocked in order to maintain policy compliance and productivity within the network. VIRTUAL FENCING Preset virtual boundaries that restrict device usage and functionality. These boundaries can be triggered by geolocation-based, time-based or Wi-Fi network-based data. UNIFIED MANAGEMENT CONSOLE Manage and synchronize all connected devices through a centralized graphical interface. NETWORK DATA MONITORING Admins can view details of Internet data used over mobile networks or Wi-Fi. They can also monitor all incoming and outgoing calls and SMSs on enterprise mobile devices. DATA THEFT FROM LOST/ STOLEN MOBILE PHONES ANTI-THEFT Prevents misuse of lost/stolen mobile phones by remotely tracking and locking them. Also prevents data breach by remotely erasing the phone’s data. INTERNET THREATS JAILBREAKING/ ROOTING OF MOBILE DEVICES MALICIOUS MOBILE APPS SECURITY MANAGEMENT Features such as browsing protection, web filtering, anti-theft, and geolocation tracking ensure the safety of enterprise devices. MOBILE MALWARE BAD SECURITY HYGIENE FEATURES RISKS MITIGATED 1 6
  • 17. 17 THANK YOU All Intellectual Property Right(s) including trademark(s), logo(s) and copyright(s) are properties of their respective owners. Copyright ©2017 Quick Heal Technologies Ltd. All rights reserved.