SlideShare une entreprise Scribd logo
1  sur  19
WELCOME
HACKERS ARE TARGETING
SMALL BUSINESS
“Hackers are
drawing a
Bull’s-Eye on small
business.”
- Robert Strohmeyer@caretpi
“One in five small businesses falls victim
to Cybercrime each year.”
HACKERS ARE TARGETING
SMALL BUSINESS
– The National Cyber Security Alliance
“And of those, 60 percent go out of business
within six months after an attack.”
HACKERS ARE TARGETING
SMALL BUSINESS
– The National Cyber Security Alliance
“Companies with fewer than 250 employees
constituted a staggering 31 percent of targeted
attacks last year. A massive jump from eighteen to
thirty-one percent in 1 year.”
- Symantec’s Internet Security Threat Report
HACKERS ARE TARGETING
SMALL BUSINESS
Why the huge
increase?
Smaller companies are
simply easy pickings, and
they don’t fight back like
bigger companies.
HACKERS ARE TARGETING
SMALL BUSINESS
They typically lack the monitoring, logs, audits,
penetration testing and other security defenses
that could alert them to a breach.
HACKERS ARE TARGETING
SMALL BUSINESS
HACKERS ARE TARGETING
SMALL BUSINESS
“It’s not about losing
information—which may not
be worth that much—but
about harming your
customers, hurting your
brand and destroying your
reputation.”
- David Maman, CTO GreenSQL
HACKERS ARE TARGETING
SMALL BUSINESS
“Most hack attacks today
are completely automated.
They check for
vulnerabilities and if they
find them, they attack.”
“They probe many thousands of IP addresses
across the Web each day.”
David Maman, CTO GreenSQL
HACKERS ARE TARGETING
SMALL BUSINESS
Hackers are organized,
sophisticated and they use
automated systems. They
are evolving…they are
cyber-chameleons.
HACKERS ARE TARGETING
SMALL BUSINESS
They are thieves.
Gartner Research…“estimates that more than 10
percent of small businesses have had funds
stolen from their bank accounts—losses totaling
more than $2 Billion.”- The New York Times
HACKERS ARE TARGETING
SMALL BUSINESS
“Small companies can no
longer rely on security
through obscurity.”
- Neal O'Farrell
Think Security First
PROTECTING YOUR BUSINESS
SYSTEM AND INFORMATION SECURITY IS A NEED
OF EVERY SMALL BUSINESS TODAY
TO MEET THIS NEED…
PROTECTING YOUR BUSINESS
STEP 1:
Using the most
sophisticated equipment
and software available, we
perform , thorough
Network Security
Assessments to identify
vulnerabilities and
exposures
PROTECTING YOUR BUSINESS
STEP 2:
Working with your IT
professional, we
correct the
vulnerabilities we find.
PROTECTING YOUR BUSINESS
STEP 3:
Continue to protect your
network with a state-of-
the-art, UTM firewall and
Caseboard® analytics
providing online
monitoring and deep
packet inspections to
block threats before they
can cause harm.
PROTECTING YOUR BUSINESS
STEP 4:
Continue to inform
everyone in your
organization through our bi-
weekly e-letter, INSIGHT,
of the need to follow safe-
habits and best-practices
when using the internet.
PROTECTING YOUR BUSINESS
In conclusion, our goal is:
• to partner with your company to make
your network strong and defended
• to eliminate vulnerabilities and to provide
the security of a UTM firewall coupled
with Caseboard® Analytics to protect your
network.
• to consider through INSIGHT,
everyone’s responsibility to practice safe-
habits and best practices
PROTECTING YOUR
BUSINESS
www.scionetix.com

Contenu connexe

Tendances

Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorFarook Al-Jibouri
 
Infographic: The crippled state of network security
Infographic: The crippled state of network securityInfographic: The crippled state of network security
Infographic: The crippled state of network securityGreat Bay Software
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsINKPPT
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2David Dubree
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secureMeg Weber
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-SecurityTara Gravel
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsWynyard Group
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
Should you beware of ransomware?
Should you beware of ransomware?Should you beware of ransomware?
Should you beware of ransomware?Globizzcon
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses FireEye, Inc.
 
Top Talks from BSides San Francisco 2017
Top Talks from BSides San Francisco 2017Top Talks from BSides San Francisco 2017
Top Talks from BSides San Francisco 2017Tripwire
 
Top 5 Insider Threat Predictions
Top 5 Insider Threat PredictionsTop 5 Insider Threat Predictions
Top 5 Insider Threat PredictionsMegan Thudium
 
4 Different Types of Insider Attacks
4 Different Types of Insider Attacks4 Different Types of Insider Attacks
4 Different Types of Insider AttacksMegan Thudium
 
IT Live 2018 - Farook Al-Jibouri: Stop The Breach
IT Live 2018 - Farook Al-Jibouri: Stop The BreachIT Live 2018 - Farook Al-Jibouri: Stop The Breach
IT Live 2018 - Farook Al-Jibouri: Stop The BreachFarook Al-Jibouri
 
A Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber MomentsA Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber MomentsTripwire
 

Tendances (20)

Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial Sector
 
Infographic: The crippled state of network security
Infographic: The crippled state of network securityInfographic: The crippled state of network security
Infographic: The crippled state of network security
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
L inkedin slides
L inkedin slidesL inkedin slides
L inkedin slides
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
 
Disaster Recovery
Disaster Recovery Disaster Recovery
Disaster Recovery
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-Security
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teams
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Should you beware of ransomware?
Should you beware of ransomware?Should you beware of ransomware?
Should you beware of ransomware?
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
Top Talks from BSides San Francisco 2017
Top Talks from BSides San Francisco 2017Top Talks from BSides San Francisco 2017
Top Talks from BSides San Francisco 2017
 
Top 5 Insider Threat Predictions
Top 5 Insider Threat PredictionsTop 5 Insider Threat Predictions
Top 5 Insider Threat Predictions
 
4 Different Types of Insider Attacks
4 Different Types of Insider Attacks4 Different Types of Insider Attacks
4 Different Types of Insider Attacks
 
IT Live 2018 - Farook Al-Jibouri: Stop The Breach
IT Live 2018 - Farook Al-Jibouri: Stop The BreachIT Live 2018 - Farook Al-Jibouri: Stop The Breach
IT Live 2018 - Farook Al-Jibouri: Stop The Breach
 
Securing the Human OS
Securing the Human OSSecuring the Human OS
Securing the Human OS
 
A Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber MomentsA Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber Moments
 

En vedette (16)

CB08 PRESENTACION TICS
CB08 PRESENTACION TICSCB08 PRESENTACION TICS
CB08 PRESENTACION TICS
 
Project time sheets & invoicing in sugar crm
Project  time sheets & invoicing  in sugar crmProject  time sheets & invoicing  in sugar crm
Project time sheets & invoicing in sugar crm
 
Proteccion juridicasoftware gomezvelazco
Proteccion juridicasoftware gomezvelazcoProteccion juridicasoftware gomezvelazco
Proteccion juridicasoftware gomezvelazco
 
Meu primeiro beijo
Meu primeiro beijoMeu primeiro beijo
Meu primeiro beijo
 
Expo3
Expo3Expo3
Expo3
 
PresentacióN1sss
PresentacióN1sssPresentacióN1sss
PresentacióN1sss
 
2.01
2.012.01
2.01
 
Presentation
PresentationPresentation
Presentation
 
ConCon Manchester: content auditing for GOV.UK
ConCon Manchester: content auditing for GOV.UKConCon Manchester: content auditing for GOV.UK
ConCon Manchester: content auditing for GOV.UK
 
Destaque32
Destaque32  Destaque32
Destaque32
 
Getronics Company Brochure
Getronics Company BrochureGetronics Company Brochure
Getronics Company Brochure
 
GOV.UK Sign In Demo 9th June 2014
GOV.UK Sign In Demo 9th June 2014GOV.UK Sign In Demo 9th June 2014
GOV.UK Sign In Demo 9th June 2014
 
Express In Music - audio branding, more than just crowdsourcing sound identities
Express In Music - audio branding, more than just crowdsourcing sound identitiesExpress In Music - audio branding, more than just crowdsourcing sound identities
Express In Music - audio branding, more than just crowdsourcing sound identities
 
'Q' magazine front cover analysis.
'Q' magazine front cover analysis.'Q' magazine front cover analysis.
'Q' magazine front cover analysis.
 
'TOTP' double page spread analysis.
'TOTP' double page spread analysis.'TOTP' double page spread analysis.
'TOTP' double page spread analysis.
 
El Alma de la Toga
El Alma de la TogaEl Alma de la Toga
El Alma de la Toga
 

Similaire à SCIONETIX PRESENTATIONaarevised(1)

Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB'sGuise Bule
 
Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesSeqrite
 
Common sense security by Fortium Partners
Common sense security by Fortium PartnersCommon sense security by Fortium Partners
Common sense security by Fortium PartnersDAVID BERGH
 
Cybersecurity statistics sheet
Cybersecurity statistics sheetCybersecurity statistics sheet
Cybersecurity statistics sheetGlobizzcon
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSRandall Chase
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...Declan Winston Ramsaran
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of SecurityKarina Elise
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls PresentationBill Lisse
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
CyberCrime Comes To Mainstreet infographic
CyberCrime Comes To Mainstreet infographicCyberCrime Comes To Mainstreet infographic
CyberCrime Comes To Mainstreet infographicKerry Desberg
 
cybercrime-comes-to-mainstreet
cybercrime-comes-to-mainstreetcybercrime-comes-to-mainstreet
cybercrime-comes-to-mainstreetAlex Spencer
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? XNSPY
 
5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your BusinessIndusfacePvtLtd
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
You Are the Target
You Are the TargetYou Are the Target
You Are the TargetEMC
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 
Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overviewbpeacher
 

Similaire à SCIONETIX PRESENTATIONaarevised(1) (20)

Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized Businesses
 
Common sense security by Fortium Partners
Common sense security by Fortium PartnersCommon sense security by Fortium Partners
Common sense security by Fortium Partners
 
Cybersecurity statistics sheet
Cybersecurity statistics sheetCybersecurity statistics sheet
Cybersecurity statistics sheet
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
CyberCrime Comes To Mainstreet infographic
CyberCrime Comes To Mainstreet infographicCyberCrime Comes To Mainstreet infographic
CyberCrime Comes To Mainstreet infographic
 
cybercrime-comes-to-mainstreet
cybercrime-comes-to-mainstreetcybercrime-comes-to-mainstreet
cybercrime-comes-to-mainstreet
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year?
 
5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overview
 

SCIONETIX PRESENTATIONaarevised(1)

  • 2. HACKERS ARE TARGETING SMALL BUSINESS “Hackers are drawing a Bull’s-Eye on small business.” - Robert Strohmeyer@caretpi
  • 3. “One in five small businesses falls victim to Cybercrime each year.” HACKERS ARE TARGETING SMALL BUSINESS – The National Cyber Security Alliance
  • 4. “And of those, 60 percent go out of business within six months after an attack.” HACKERS ARE TARGETING SMALL BUSINESS – The National Cyber Security Alliance
  • 5. “Companies with fewer than 250 employees constituted a staggering 31 percent of targeted attacks last year. A massive jump from eighteen to thirty-one percent in 1 year.” - Symantec’s Internet Security Threat Report HACKERS ARE TARGETING SMALL BUSINESS
  • 6. Why the huge increase? Smaller companies are simply easy pickings, and they don’t fight back like bigger companies. HACKERS ARE TARGETING SMALL BUSINESS
  • 7. They typically lack the monitoring, logs, audits, penetration testing and other security defenses that could alert them to a breach. HACKERS ARE TARGETING SMALL BUSINESS
  • 8. HACKERS ARE TARGETING SMALL BUSINESS “It’s not about losing information—which may not be worth that much—but about harming your customers, hurting your brand and destroying your reputation.” - David Maman, CTO GreenSQL
  • 9. HACKERS ARE TARGETING SMALL BUSINESS “Most hack attacks today are completely automated. They check for vulnerabilities and if they find them, they attack.” “They probe many thousands of IP addresses across the Web each day.” David Maman, CTO GreenSQL
  • 10. HACKERS ARE TARGETING SMALL BUSINESS Hackers are organized, sophisticated and they use automated systems. They are evolving…they are cyber-chameleons.
  • 11. HACKERS ARE TARGETING SMALL BUSINESS They are thieves. Gartner Research…“estimates that more than 10 percent of small businesses have had funds stolen from their bank accounts—losses totaling more than $2 Billion.”- The New York Times
  • 12. HACKERS ARE TARGETING SMALL BUSINESS “Small companies can no longer rely on security through obscurity.” - Neal O'Farrell Think Security First
  • 13. PROTECTING YOUR BUSINESS SYSTEM AND INFORMATION SECURITY IS A NEED OF EVERY SMALL BUSINESS TODAY TO MEET THIS NEED…
  • 14. PROTECTING YOUR BUSINESS STEP 1: Using the most sophisticated equipment and software available, we perform , thorough Network Security Assessments to identify vulnerabilities and exposures
  • 15. PROTECTING YOUR BUSINESS STEP 2: Working with your IT professional, we correct the vulnerabilities we find.
  • 16. PROTECTING YOUR BUSINESS STEP 3: Continue to protect your network with a state-of- the-art, UTM firewall and Caseboard® analytics providing online monitoring and deep packet inspections to block threats before they can cause harm.
  • 17. PROTECTING YOUR BUSINESS STEP 4: Continue to inform everyone in your organization through our bi- weekly e-letter, INSIGHT, of the need to follow safe- habits and best-practices when using the internet.
  • 18. PROTECTING YOUR BUSINESS In conclusion, our goal is: • to partner with your company to make your network strong and defended • to eliminate vulnerabilities and to provide the security of a UTM firewall coupled with Caseboard® Analytics to protect your network. • to consider through INSIGHT, everyone’s responsibility to practice safe- habits and best practices