2. HACKERS ARE TARGETING
SMALL BUSINESS
“Hackers are
drawing a
Bull’s-Eye on small
business.”
- Robert Strohmeyer@caretpi
3. “One in five small businesses falls victim
to Cybercrime each year.”
HACKERS ARE TARGETING
SMALL BUSINESS
– The National Cyber Security Alliance
4. “And of those, 60 percent go out of business
within six months after an attack.”
HACKERS ARE TARGETING
SMALL BUSINESS
– The National Cyber Security Alliance
5. “Companies with fewer than 250 employees
constituted a staggering 31 percent of targeted
attacks last year. A massive jump from eighteen to
thirty-one percent in 1 year.”
- Symantec’s Internet Security Threat Report
HACKERS ARE TARGETING
SMALL BUSINESS
6. Why the huge
increase?
Smaller companies are
simply easy pickings, and
they don’t fight back like
bigger companies.
HACKERS ARE TARGETING
SMALL BUSINESS
7. They typically lack the monitoring, logs, audits,
penetration testing and other security defenses
that could alert them to a breach.
HACKERS ARE TARGETING
SMALL BUSINESS
8. HACKERS ARE TARGETING
SMALL BUSINESS
“It’s not about losing
information—which may not
be worth that much—but
about harming your
customers, hurting your
brand and destroying your
reputation.”
- David Maman, CTO GreenSQL
9. HACKERS ARE TARGETING
SMALL BUSINESS
“Most hack attacks today
are completely automated.
They check for
vulnerabilities and if they
find them, they attack.”
“They probe many thousands of IP addresses
across the Web each day.”
David Maman, CTO GreenSQL
10. HACKERS ARE TARGETING
SMALL BUSINESS
Hackers are organized,
sophisticated and they use
automated systems. They
are evolving…they are
cyber-chameleons.
11. HACKERS ARE TARGETING
SMALL BUSINESS
They are thieves.
Gartner Research…“estimates that more than 10
percent of small businesses have had funds
stolen from their bank accounts—losses totaling
more than $2 Billion.”- The New York Times
12. HACKERS ARE TARGETING
SMALL BUSINESS
“Small companies can no
longer rely on security
through obscurity.”
- Neal O'Farrell
Think Security First
14. PROTECTING YOUR BUSINESS
STEP 1:
Using the most
sophisticated equipment
and software available, we
perform , thorough
Network Security
Assessments to identify
vulnerabilities and
exposures
16. PROTECTING YOUR BUSINESS
STEP 3:
Continue to protect your
network with a state-of-
the-art, UTM firewall and
Caseboard® analytics
providing online
monitoring and deep
packet inspections to
block threats before they
can cause harm.
17. PROTECTING YOUR BUSINESS
STEP 4:
Continue to inform
everyone in your
organization through our bi-
weekly e-letter, INSIGHT,
of the need to follow safe-
habits and best-practices
when using the internet.
18. PROTECTING YOUR BUSINESS
In conclusion, our goal is:
• to partner with your company to make
your network strong and defended
• to eliminate vulnerabilities and to provide
the security of a UTM firewall coupled
with Caseboard® Analytics to protect your
network.
• to consider through INSIGHT,
everyone’s responsibility to practice safe-
habits and best practices