SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
®
Cybercrime – The ever-growing
threat to your business
An essential guide from Thawte
WHITE PAPER 2015
Contents:
Cybercrime – The ever-growing threat to your business: Introduction				 3
Data breaches										4
Phishing											4
Spam 											5
Identity theft	 									6
Vulnerabilities & malware threats								7
Damage to your business									7
A strategy that protects you									8
Fighting back with SSL	 								8
Take your security to the next level with an ‘Always-On’ approach					 9
Conclusion										9
Cybercrime – The ever-growing threat to your business
2
®
Cybercrime – The ever-growing threat to your business
3
Cybercrime – The ever-growing threat to your business
Introduction
‘Cybercrime’ has entered the lexicon in a big way and has become a significant threat to businesses wherever they
are located and whatever their size. But how bad is the threat? And why does it cause such high levels of alarm and
concern?
2014 saw cybercrime operations grow ever more refined, with specializations, service providers and fluctuating
markets very much mirroring the legitimate technology industry. According to the Symantec ‘Website Security Threat
Report 2015’1
, “a drive-by download web toolkit”, for example, which includes updates and 24/7 support, can be
rented for between $100 and $700 per week. Distributed denial of service (DDoS) attacks can be ordered from $10
to $1,000 per day and, in terms of the buyer’s market, credit card details can be bought for between $0.50 and $20
per card, while 1,000 followers on a social network can cost as little as $2 to $12.
A report by Hewlett Packard and the U.S.-based Ponemon Institute of Cybercrime2
stated that hacking attacks
cost the average American firm $15.4 million per year, double the global average of $7.7 million. The most costly
cybercrimes were those carried out by malicious insiders, DDoS and web-based attacks. The global financial
services and energy sectors were the worst hit, with an average annual cost of $13.5 and $12.8 million.
®
$15.4
MILLION
PER YEAR
Cost the average American firm
HACKING ATTACKS
for the global
financial services sector is
The average annual cost of
CYBERCRIME
$13.5
MILLION
is one of the worst hit costing
on average each year
THE ENERGY SECTOR
$12.8
MILLION
1
http://www.symantec.com/security_response/publications/threatreport.jsp
2
“Hewlett Packard and the U.S.-based Ponemon Institute of Cybercrime”
Cybercrime – The ever-growing threat to your business
4
®
Data breaches
If 2014’s high-profile data breaches taught us anything, it’s that IT security teams need to step up their game in 2015
and beyond.
Indeed, more recent high-profile hacking attacks, such as those affecting Sony, Netflix, health insurer Anthem and
parking ticket website PaymyPCN.net, have served to increase business concerns substantially about the real-world
implications of cybercrime. With growing numbers of hacking attacks aimed at harvesting valuable data, such as
healthcare records and credit card numbers, enterprises are increasingly recognizing – and often feeling – the effects
of data misuse. Their critical systems are facing increasingly sophisticated threats and whilst shoring up the perimeter
against known attacks is paramount, it is not enough. Solutions employed right across the business must be just as
advanced and persistent as the threats they face, going well beyond traditional approaches. One key reason why
cybercrime is flourishing is due to the myriad of opportunities to exploit vulnerabilities in an enterprise’s defence system,
such as those resulting from negligence and human error, leaving a company open to data breaches and enabling an
external attacker to hijack legitimate credentials to infiltrate a corporate network.
Phishing
It’s worth pinpointing some of the key areas of vulnerabilities that cybercriminals are now exploiting and the damage
they can cause. Spear phishing attacks: a virtual trap set by cyber thieves that use official-looking emails to lure you to
fake websites and trick you into revealing your personal information.
Phishing attacks start with an innocent-looking email that appears to come from a trustworthy source, but have now
evolved to the extent that often neither the individual nor the organisation is even aware an incident has occurred until it
is too late and confidential data has already been stolen. They are mainly designed to deceive employees, who are still
seen as the ‘weakest link’, but Thawte has observed that many companies simply do not have efficient internal incident
response procedures in place to alert their staff about such threats.
There are a number of key processes that should be functional for an organization to be able to resist these external
threats, including the length of time before a phishing email is recorded as an incident and having effective out-bound
email filters implemented to prevent the leakage of sensitive data. For example, companies should be able to respond
to a phishing attack within 15 minutes of receiving the malicious email. Efficiency at the early stages is crucial. Yet
many of them fail to react within that time frame.
Cybercrime – The ever-growing threat to your business
5
®
Most phishing scams are distributed through phishing emails or URLs on social media sites. On social media, there’s
often a news hook, like the Ebola outbreak, or some kind of celebrity scandal that encourages people to click on links that
require them to ‘login’ before they can see the details or video promised. Email distribution can also involve news hooks,
but is used to phish for professional account logins, such as banking details, LinkedIn accounts and cloud file storage.3
Some emails pose as security updates or unusual activity warnings that require you to fill in your details on a phishing site,
which immediately sends your details to the criminals.
The origins of these phishing sites are often obscured to prevent security warnings when victims open their browsers,
and this year saw a new leap forward for the criminals, with the use of AES (Advanced Encryption Standard) . The
encryption is designed to make the analysis of phishing sites more difficult and a casual analysis of the page will not
reveal any phishing-related content, as it is contained in the unreadable encrypted text. Browser and security software
warnings are therefore less likely to appear, more victims are likely to fall for the scam and it’s harder to track4
.
This is an increasingly menacing world, faceless, aggressive and highly sophisticated. And ignoring it is no protection.
Any wise enterprise must assume that they are in line to be targeted, no matter where they are or what size of
operation. Accepting that there is a phishing scam somewhere down the line that will have you in its sights is by far the
best policy – because then you can plan exactly how to deal with the fallout and possibly spare your business untold
damage.
Spam
The most common form of spam is unwanted email, but you can also get text message spam, instant message spam
(sometimes known as spim), and social networking spam. Some spam is harmless, but at the other end of the scale, it
is used as part of an identity theft scam or other kind of fraud.
A common approach is for spammers to flood the Internet with many copies of the same message, in an attempt to
force the message on people who would not otherwise choose to receive it. Most email spam is commercial advertising,
often for dubious products, get-rich-quick schemes or bogus legal services.
One particularly nasty variant of email spam is sending spam to mailing lists (public or private email discussion forums). Since
many mailing lists limit activity to their subscribers, spammers will use automated tools to subscribe to as many mailing lists
as possible, so that they can grab the lists of addresses or use the mailing list as a direct target for their attacks.
Spam is big business and the spammers keep doing it because people keep falling for their scams, clicking on links
to install key loggers. One seemingly innocent such scam is to add at the end of an email a phrase such as ‘To
unsubscribe, click here’, enticing the recipient to respond. By clicking and performing the action, you have told the
spammer your email address is valid and reaches a real person. Spammers can now sell your address to another
spammer, with the assurance that the email address is legitimate.
3
http://www.symantec.com/connect/blogs/linkedin-alert-scammers-use-security-update-phish-credentials
3
http://www.symantec.com/connect/blogs/google-docs-users-targeted-sophisticated-phishing-scam
3
http://www.symantec.com/connect/blogs/dropbox-users-targeted-phishing-scam-hosted-dropbox
4
http://www.symantec.com/connect/blogs/fresh-phish-served-helping-aes
69%2012 20142013
66% 60%
On the plus side, over the last three
years, states the Symantec ‘Website
Security Threat Report 2015’, the overall
spam rate has dropped from 69% in
2012 to 66% in 2013 and 60% in 2014
Cybercrime – The ever-growing threat to your business
6
®
On the plus side, over the last three years, states the Symantec ‘Website Security Threat Report 2015’, the overall
spam rate has dropped from 69% in 2012 to 66% in 2013 and 60% in 2014. While this is good news, there are still a lot
of scams out there being sent by email – and criminals are still making plenty of money. In October, Symantec reported
an increase in a particular scam where emails were sent, often to a recipient working in the finance department of a
company, requesting payment by credit card or the completion of a wire transfer. The sender details were sometimes
faked or made to look like they had come from the CEO, or other high-ranking member of the victim’s company, and
money transfer details were either sent in an attachment or required the victim to email back and request them.5
The rise in this type of scam is most likely due to the fact that scams based on malicious attachments can be more
easily filtered by corporate security systems, but many organisations are still not undertaking this simple action, despite
the majority of malicious emails still relying on potentially harmful attachments. In contrast, a sharp rise in malicious
URLs versus attachments at the end of the year was related to a change in tactics and surge in socially engineered
spam emails.
“End users should be mindful when using any social network, keeping an eye out for free offers for gadgets, gift cards
and airline tickets or enticing invitations to join adult dating and webcam sites,” cautions the report. “If you are asked to
fill out a survey or sign up for a service using a credit card, you are most likely being scammed.” As the old adage goes:
‘If it sounds too good to be true, it probably is.’
Identity theft
Identity theft – the process of your on-line self gradually being taken over – could start when someone hacks your
webmail, and then your PayPal and iTunes accounts. That becomes the passport into other accounts, until the
cybercriminals who stalk the Internet, looking for easy victims, all but control your online life.
Why are more and more people being caught in this deadly trap? In part, because many of us fail to properly secure our
vital data and systems, using the same, easily broken, passwords (daisy chaining) across email accounts and multiple sites
that we visit, leaving behind a trail of personal details from which the hackers can build a picture of exactly who we are.
To criminals, business identity theft means the potential for even more easy money and goods. It involves the actual
impersonation of the business itself. It can occur through the theft or misuse of key business identifiers and credentials,
manipulation or falsification of business filings and records, and other related criminal activities intended to derive
illicit gain to the detriment of the victimised business; and, to defraud creditors and suppliers, financial institutions,
the business’ owners and officers, unsuspecting consumers, and even the government. Any type of business or
organization of any size, or legal structure, is a target.
Right now, someone reading this white paper will almost certainly be being groomed as another victim of identity
theft – the estimated worldwide cost of which has soared to around $5 billion a year, according to the latest Microsoft
Consumer Safety Index survey.
5
http://www.symantec.com/connect/blogs/malicious-links-spammers-change-malware-delivery-tactics
Identity theft estimated worldwide cost
$5BILLIONAYEAR
Cybercrime – The ever-growing threat to your business
7
®
As for passwords, the ultimate problem is that it is all too often the hacker’s passport to all that’s most private and
precious – a single point of failure that, once infiltrated, can open the floodgates, allowing them access to every aspect
of your personal life. In the main, we are lazy and careless with our passwords, tending to daisy chain them or opt for
the obvious, such as ‘password’ or ‘123456’. As for employing a short password, no matter how watertight you may think
it is, modern processing speeds are able to rip through 10,000 passwords in just a few seconds. Best practice dictates
that you change your passwords regularly, making them complex and strong.
Vulnerabilities & malware threats
While the levels of spam may be falling off slightly, the trend in the number of vulnerabilities leaving enterprises exposed
to attacks is doing the exact opposite, continuing inexorably upwards. And although remedies, workarounds or patches
are readily available for the majority of reported vulnerabilities, malware authors are only too aware that many people do
not apply these updates – and so they are able to exploit well documented vulnerabilities.
In many cases, a specialist ‘dropper’ scans for a number of known vulnerabilities and uses any unpatched security
weakness as a backdoor to install malware – the short form for ‘malicious software’; ie, any kind of unwanted software
installed without your consent. Viruses, worms and Trojan horses are all examples of malware.
This, of course, underlines the crucial importance of applying updates; this is how web exploit toolkits, such as Sakura
and Blackhole, have made it easier for attackers to exploit an unpatched vulnerability published months or even years
previously.
Several exploits may be created for each vulnerability, and a web attack toolkit will first perform a vulnerability scan
on the browser to identify any potentially vulnerable plug-ins and the best attack that can be applied. Many toolkits
won’t utilize the latest exploits for new vulnerabilities, if an old one will suffice; exploits against zero-day vulnerabilities
are uncommon and highly sought after by the attackers, especially for use in ‘watering-hole’ attacks: ie, the targeted
hijacking of legitimate websites to push malware.
With the majority of websites still accommodating vulnerabilities, it is clear that many website owners are not keeping on
top of vulnerability scans. They may be paying more attention to malware scans that could potentially reveal malicious
software – yet malware is often planted following the earlier exploitation of vulnerabilities.
Damage to your business
So what is the likely impact of all these attacks on you and your organisation? Typically, aggressive attacks can cause
prolonged disruption to internal and external business operations. Servers may be taken down completely, data wiped
and digital intellectual property released on the Internet by attackers. Employees may not be able to fully function
normally in the workplace for months afterwards. On top of that, such attacks may expose embarrassing internal data
via social media channels — and could have a longer media cycle than a breach of credit card or personal data.
However, the impact of a cyberattack goes far beyond that. The loss or theft of sensitive customer data can also have
a serious impact on the economic value of a company’s reputation. Anyone affected where data has been stolen or
disclosed without their consent may react by publicising the matter in social media and/or inform journalists, as well as
the regulator. This can lead to a wider distrust of the company, which, in turn, can result in the blacklisting of its website,
lost business and/or a fall in the share price.
A company’s reputation is its greatest asset, making it imperative that business leaders take every possible step to
protect themselves, customers, employees and intellectual property against data breaches and the potential fall-out
from negative publicity this provokes.
Cybercrime – The ever-growing threat to your business
8
®
A strategy that protects you
Every business needs to have in place a comprehensive strategy to protect themselves against all of these points of
entry – and also to detect whether they have already become unknowing victims of the growing tide of cybercrime. This
is the time for organisations to take a holistic approach to the security procedures required to combat advanced threats,
rather than look for a ‘silver bullet’ technology solution. A ‘hands-on’ approach by IT departments, in conjunction with
external data specialists, can then help implement, review and enhance security procedures. Not acting now only opens
the door wider to the likelihood of a successful attack that may well mean loss of revenue, of customer trust and the
potential loss of critical data.
Most worryingly, such attacks could be initiated externally or internally. While the vast majority of employees are
principled and loyal to the business, there need to be systems in place to guard against those who are not. At the
same time, genuine human error is equally a fact of life and may prove just as costly where it leads to a breach of your
defences. With the right controls and protections in place, with help from the right provider, the guessing game of who is
ethical and who is not, or who is trying to exploit your IP – or indeed already have – becomes redundant and a thing of
the past.
Fighting back with SSL
While admittedly there is no silver bullet, a number of technologies can help protect you and your customers, and
underpin business credibility. With many of the current phishing techniques relying on driving customers to spoofed
websites to capture personal information, that is where technology such as Secure Sockets Layer (SSL) becomes
critical in fighting phishing and the other forms of cybercrime described in this white paper – by encrypting sensitive
information and authenticating your site. If you are not already using SSL, then look at it not as an option, but as a ‘must
be deployed now’. The welfare of your business and its very reputation depend on it.
Ultimately, security best practices call for implementing the highest levels of encryption and authentication possible
to protect against cyber fraud and build customer trust in the brand. SSL, the world standard for online security, is the
technology used to encrypt and protect information transmitted over the web. SSL protects data in motion – which
can be intercepted and tampered with, if sent unencrypted. Moreover, support for SSL is built into all major operating
systems, web browsers, Internet applications and server hardware.
Choose Extended Validation (EV) SSL Certificates for the highest visible display of online trust. This is the gold standard
in SSL certificates. EV verification guidelines, drawn up by the CA/ Browser Forum, require the CA to run a much more
rigorous identity check on the organisation or individual applying for the certificate. Sites with an EV SSL certificate have
a green browser address bar and a field appears with the name of the legitimate website owner and the name of the CA
that issued the certificate.
Choose Extended Validation (EV) SSL Certificates for the highest visible display of online trust
Cybercrime – The ever-growing threat to your business
9
®
Take your security to the next level with an ‘Always-On’ approach
Businesses that are serious about protecting customers and their business reputations should implement ‘Always-
On SSL’, with SSL certificates from a trusted Certificate Authority such as Thawte. Always-On SSL delivers the same
high level of SSL protection throughout your site, securing the visitor’s entire session with SSL, not just on forms and
checkout pages. Visitors will always feel secure with the reassuring ‘HTTPS’ at the beginning of the browser address
bar throughout their entire stay on your website, making it safer to search, share and shop online. What’s more, Google
now favours websites that implement ‘HTTPS everywhere’/Always-On SSL, rewarding owners with an SEO ranking
boost.
Conclusion
The ever-increasing threat from data breaches, phishing, spam, identity theft, vulnerabilities and malware means that
organisations like yours can no longer afford inaction. With the cost of cybercrime in the U.S. alone heading towards
$16 million per year, security technologies that underpin online business credibility and customer trust are now more
vital than ever. This is why SSL is now a must-have for any organisation interested in protecting its customers and
its online reputation. It’s why Always-On SSL, which protects your customers during their entire user session, is now
favoured by sites like Google and is fast becoming the new standard in website security. And it’s also why Thawte is
here to provide you with all the expertise and website security technology you need.
Cybercrime – The ever-growing threat to your business
9
®
Green bar
Increase your conversions and reduce fraud
with the Thawte Green Bar.
Not All SSL Is the Same
Thawte online security is trusted by millions of people around the world. Here are just a few reasons to switch to Thawte:
Strongest SSL Encryption
Protect your confidential data with 256-bit SSL
encryption and $1.5m USD Warranty.
Lightning Fast OCSP Speed
Faster Online Certificate StatusProtocol
(OCSP) response delivers an optimised
customer experience.
Thawte Certification Center
Buy, renew, and manage certificates
with a single, secure sign-in to
Thawte®
Certificate Center.
Scalability
Thawte grows with you. Ourinfrastructure
supports more revocation checking globally
than all other Certificate Authorities combined.
Uncompromised Infrastructure
Thawte is the 1st International SSL
certificate provider and has never been
breached or compromised. Delivering
100% planned uptime.
Industry Leading Support
Easy enrolment, installation help and
world class multi-lingual expert support
help you get up and running fast.
Money-back Guarantee
We provide a 30 day, no questions asked,
money-back guarantee to ensure you are
satisfied with your purchase.
More Information
If you have further questions,
or would like to speak with a Sales Advisor,
please feel free to contact us:
Via phone
US toll-free: +1 888 484 2983
UK: +44 203 450 5486
South Africa: +27 21 819 2800
Germany: +49 69 3807 89081
France: +33 1 57 32 42 68
Email
sales@thawte.com
Visit our website at https://www.thawte.com/ssl
© 2015 Thawte, Inc. All rights reserved. Thawte, the Thawte logo, and other
trademarks, service marks, and designs are registered or unregistered trademarks
of Thawte, Inc. and its subsidiaries and affiliates in the United States and in foreign
countries. All other trademarks are property of their respective owners.
Protect your business and translate trust to your customers with high-assurance digital
certificates from Thawte, the world’s first international specialist in online security. Backed
by a 17-year track record of stability and reliability, a proven infrastructure, and world-class
customer support, Thawte is the international partner of choice for businesses worldwide.
BUY TRY LEARN MORE

Contenu connexe

Tendances

Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attackKarthik
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation AniketPandit18
 
7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By StellariseElena Tatarenkova
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce websiteDr. Raghavendra GS
 
Proofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Entersoft Security
 
Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint
 
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...Eyal Doron
 
CYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportCYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportChris Taylor
 

Tendances (20)

Exploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In PhishingExploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In Phishing
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Phishing
PhishingPhishing
Phishing
 
7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
 
Proofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat Report
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 
Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018
 
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Social Engineering CSO Survival Guide
Social Engineering CSO Survival GuideSocial Engineering CSO Survival Guide
Social Engineering CSO Survival Guide
 
CYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportCYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_Report
 
Cb Threat Report
Cb Threat ReportCb Threat Report
Cb Threat Report
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Spear Phishing
Spear PhishingSpear Phishing
Spear Phishing
 
War against Identity Theft and Phising attack
War against Identity Theft and Phising attack War against Identity Theft and Phising attack
War against Identity Theft and Phising attack
 

Similaire à Cybercrime - An essential guide from Thawte

negative implications of IT
negative implications of ITnegative implications of IT
negative implications of ITMahdiRahmani15
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...IRJET Journal
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfanjandavid
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...MZERMA Amine
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigationNimishaRawat
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar SessionKalilur Rahman
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB'sGuise Bule
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
NYCDS-DQ-Winter-2016-Cyber-Security
NYCDS-DQ-Winter-2016-Cyber-SecurityNYCDS-DQ-Winter-2016-Cyber-Security
NYCDS-DQ-Winter-2016-Cyber-SecurityOndrej Krehel
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences MagazineThe Lifesciences Magazine
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrimethinkwithniche
 

Similaire à Cybercrime - An essential guide from Thawte (20)

negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdf
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
NYCDS-DQ-Winter-2016-Cyber-Security
NYCDS-DQ-Winter-2016-Cyber-SecurityNYCDS-DQ-Winter-2016-Cyber-Security
NYCDS-DQ-Winter-2016-Cyber-Security
 
W verb68
W verb68W verb68
W verb68
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Cyber Attacks
Cyber AttacksCyber Attacks
Cyber Attacks
 
E commerce-securityy
E commerce-securityyE commerce-securityy
E commerce-securityy
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 

Plus de RapidSSLOnline.com

Tackle ERR_SSL_PROTOCOL_ERROR in Google Chrome
Tackle ERR_SSL_PROTOCOL_ERROR in Google ChromeTackle ERR_SSL_PROTOCOL_ERROR in Google Chrome
Tackle ERR_SSL_PROTOCOL_ERROR in Google ChromeRapidSSLOnline.com
 
Viewing SSL Certificate in Chrome | RapidSSLonline
Viewing SSL Certificate in Chrome | RapidSSLonlineViewing SSL Certificate in Chrome | RapidSSLonline
Viewing SSL Certificate in Chrome | RapidSSLonlineRapidSSLOnline.com
 
Compare GeoTrust True BusinessID SSL Data Sheet
Compare GeoTrust True BusinessID SSL Data SheetCompare GeoTrust True BusinessID SSL Data Sheet
Compare GeoTrust True BusinessID SSL Data SheetRapidSSLOnline.com
 
Introducing TLS 1.3 – The future of Encryption
Introducing TLS 1.3 – The future of EncryptionIntroducing TLS 1.3 – The future of Encryption
Introducing TLS 1.3 – The future of EncryptionRapidSSLOnline.com
 
GUIDE ON INSTALLING SSL CERTIFICATE ON IBM HTTP SERVER
GUIDE ON INSTALLING SSL CERTIFICATE ON IBM HTTP SERVERGUIDE ON INSTALLING SSL CERTIFICATE ON IBM HTTP SERVER
GUIDE ON INSTALLING SSL CERTIFICATE ON IBM HTTP SERVERRapidSSLOnline.com
 
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecCybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecRapidSSLOnline.com
 
Adobe Connect on-premise SSL Guide
Adobe Connect on-premise SSL GuideAdobe Connect on-premise SSL Guide
Adobe Connect on-premise SSL GuideRapidSSLOnline.com
 
How to Move SSL Certificate from Windows Server to Another Windows Server
How to Move SSL Certificate from Windows Server to Another Windows ServerHow to Move SSL Certificate from Windows Server to Another Windows Server
How to Move SSL Certificate from Windows Server to Another Windows ServerRapidSSLOnline.com
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionRapidSSLOnline.com
 
SSL / TLS Validation | CASecurity.org | RapidSSLonline
SSL / TLS Validation | CASecurity.org | RapidSSLonlineSSL / TLS Validation | CASecurity.org | RapidSSLonline
SSL / TLS Validation | CASecurity.org | RapidSSLonlineRapidSSLOnline.com
 
Geek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL AuthenticationGeek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL AuthenticationRapidSSLOnline.com
 
A Complete RapidSSL Guide on Securing Online Business with SSL Certificate
A Complete RapidSSL Guide on Securing Online Business with SSL CertificateA Complete RapidSSL Guide on Securing Online Business with SSL Certificate
A Complete RapidSSL Guide on Securing Online Business with SSL CertificateRapidSSLOnline.com
 
Google Chrome 56 What You Need to Know?
Google Chrome 56   What You Need to Know?Google Chrome 56   What You Need to Know?
Google Chrome 56 What You Need to Know?RapidSSLOnline.com
 
The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates RapidSSLOnline.com
 
5 Steps for Preventing Ransomware
5 Steps for Preventing Ransomware5 Steps for Preventing Ransomware
5 Steps for Preventing RansomwareRapidSSLOnline.com
 
2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat ReportRapidSSLOnline.com
 
How Does The Wildcard SSL Work?
How Does The Wildcard SSL Work?How Does The Wildcard SSL Work?
How Does The Wildcard SSL Work?RapidSSLOnline.com
 
Uncover threats and protect your organization
Uncover threats and protect your organizationUncover threats and protect your organization
Uncover threats and protect your organizationRapidSSLOnline.com
 
A New Zero-Day Vulnerability Discovered Every Week in 2015
A New Zero-Day Vulnerability Discovered Every Week in 2015A New Zero-Day Vulnerability Discovered Every Week in 2015
A New Zero-Day Vulnerability Discovered Every Week in 2015RapidSSLOnline.com
 

Plus de RapidSSLOnline.com (20)

Tackle ERR_SSL_PROTOCOL_ERROR in Google Chrome
Tackle ERR_SSL_PROTOCOL_ERROR in Google ChromeTackle ERR_SSL_PROTOCOL_ERROR in Google Chrome
Tackle ERR_SSL_PROTOCOL_ERROR in Google Chrome
 
Viewing SSL Certificate in Chrome | RapidSSLonline
Viewing SSL Certificate in Chrome | RapidSSLonlineViewing SSL Certificate in Chrome | RapidSSLonline
Viewing SSL Certificate in Chrome | RapidSSLonline
 
Compare GeoTrust True BusinessID SSL Data Sheet
Compare GeoTrust True BusinessID SSL Data SheetCompare GeoTrust True BusinessID SSL Data Sheet
Compare GeoTrust True BusinessID SSL Data Sheet
 
Introducing TLS 1.3 – The future of Encryption
Introducing TLS 1.3 – The future of EncryptionIntroducing TLS 1.3 – The future of Encryption
Introducing TLS 1.3 – The future of Encryption
 
GUIDE ON INSTALLING SSL CERTIFICATE ON IBM HTTP SERVER
GUIDE ON INSTALLING SSL CERTIFICATE ON IBM HTTP SERVERGUIDE ON INSTALLING SSL CERTIFICATE ON IBM HTTP SERVER
GUIDE ON INSTALLING SSL CERTIFICATE ON IBM HTTP SERVER
 
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecCybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
 
Adobe Connect on-premise SSL Guide
Adobe Connect on-premise SSL GuideAdobe Connect on-premise SSL Guide
Adobe Connect on-premise SSL Guide
 
How to Move SSL Certificate from Windows Server to Another Windows Server
How to Move SSL Certificate from Windows Server to Another Windows ServerHow to Move SSL Certificate from Windows Server to Another Windows Server
How to Move SSL Certificate from Windows Server to Another Windows Server
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
 
SSL / TLS Validation | CASecurity.org | RapidSSLonline
SSL / TLS Validation | CASecurity.org | RapidSSLonlineSSL / TLS Validation | CASecurity.org | RapidSSLonline
SSL / TLS Validation | CASecurity.org | RapidSSLonline
 
Geek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL AuthenticationGeek Guide: Apache Web Servers and SSL Authentication
Geek Guide: Apache Web Servers and SSL Authentication
 
All About SSL/TLS
All About SSL/TLSAll About SSL/TLS
All About SSL/TLS
 
A Complete RapidSSL Guide on Securing Online Business with SSL Certificate
A Complete RapidSSL Guide on Securing Online Business with SSL CertificateA Complete RapidSSL Guide on Securing Online Business with SSL Certificate
A Complete RapidSSL Guide on Securing Online Business with SSL Certificate
 
Google Chrome 56 What You Need to Know?
Google Chrome 56   What You Need to Know?Google Chrome 56   What You Need to Know?
Google Chrome 56 What You Need to Know?
 
The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates
 
5 Steps for Preventing Ransomware
5 Steps for Preventing Ransomware5 Steps for Preventing Ransomware
5 Steps for Preventing Ransomware
 
2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report
 
How Does The Wildcard SSL Work?
How Does The Wildcard SSL Work?How Does The Wildcard SSL Work?
How Does The Wildcard SSL Work?
 
Uncover threats and protect your organization
Uncover threats and protect your organizationUncover threats and protect your organization
Uncover threats and protect your organization
 
A New Zero-Day Vulnerability Discovered Every Week in 2015
A New Zero-Day Vulnerability Discovered Every Week in 2015A New Zero-Day Vulnerability Discovered Every Week in 2015
A New Zero-Day Vulnerability Discovered Every Week in 2015
 

Dernier

Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldRoberto Pérez Alcolea
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Anthony Dahanne
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxRTS corp
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolsosttopstonverter
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfRTS corp
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencessuser9e7c64
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 

Dernier (20)

Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository world
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration tools
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conference
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 

Cybercrime - An essential guide from Thawte

  • 1. ® Cybercrime – The ever-growing threat to your business An essential guide from Thawte WHITE PAPER 2015
  • 2. Contents: Cybercrime – The ever-growing threat to your business: Introduction 3 Data breaches 4 Phishing 4 Spam 5 Identity theft 6 Vulnerabilities & malware threats 7 Damage to your business 7 A strategy that protects you 8 Fighting back with SSL 8 Take your security to the next level with an ‘Always-On’ approach 9 Conclusion 9 Cybercrime – The ever-growing threat to your business 2 ®
  • 3. Cybercrime – The ever-growing threat to your business 3 Cybercrime – The ever-growing threat to your business Introduction ‘Cybercrime’ has entered the lexicon in a big way and has become a significant threat to businesses wherever they are located and whatever their size. But how bad is the threat? And why does it cause such high levels of alarm and concern? 2014 saw cybercrime operations grow ever more refined, with specializations, service providers and fluctuating markets very much mirroring the legitimate technology industry. According to the Symantec ‘Website Security Threat Report 2015’1 , “a drive-by download web toolkit”, for example, which includes updates and 24/7 support, can be rented for between $100 and $700 per week. Distributed denial of service (DDoS) attacks can be ordered from $10 to $1,000 per day and, in terms of the buyer’s market, credit card details can be bought for between $0.50 and $20 per card, while 1,000 followers on a social network can cost as little as $2 to $12. A report by Hewlett Packard and the U.S.-based Ponemon Institute of Cybercrime2 stated that hacking attacks cost the average American firm $15.4 million per year, double the global average of $7.7 million. The most costly cybercrimes were those carried out by malicious insiders, DDoS and web-based attacks. The global financial services and energy sectors were the worst hit, with an average annual cost of $13.5 and $12.8 million. ® $15.4 MILLION PER YEAR Cost the average American firm HACKING ATTACKS for the global financial services sector is The average annual cost of CYBERCRIME $13.5 MILLION is one of the worst hit costing on average each year THE ENERGY SECTOR $12.8 MILLION 1 http://www.symantec.com/security_response/publications/threatreport.jsp 2 “Hewlett Packard and the U.S.-based Ponemon Institute of Cybercrime”
  • 4. Cybercrime – The ever-growing threat to your business 4 ® Data breaches If 2014’s high-profile data breaches taught us anything, it’s that IT security teams need to step up their game in 2015 and beyond. Indeed, more recent high-profile hacking attacks, such as those affecting Sony, Netflix, health insurer Anthem and parking ticket website PaymyPCN.net, have served to increase business concerns substantially about the real-world implications of cybercrime. With growing numbers of hacking attacks aimed at harvesting valuable data, such as healthcare records and credit card numbers, enterprises are increasingly recognizing – and often feeling – the effects of data misuse. Their critical systems are facing increasingly sophisticated threats and whilst shoring up the perimeter against known attacks is paramount, it is not enough. Solutions employed right across the business must be just as advanced and persistent as the threats they face, going well beyond traditional approaches. One key reason why cybercrime is flourishing is due to the myriad of opportunities to exploit vulnerabilities in an enterprise’s defence system, such as those resulting from negligence and human error, leaving a company open to data breaches and enabling an external attacker to hijack legitimate credentials to infiltrate a corporate network. Phishing It’s worth pinpointing some of the key areas of vulnerabilities that cybercriminals are now exploiting and the damage they can cause. Spear phishing attacks: a virtual trap set by cyber thieves that use official-looking emails to lure you to fake websites and trick you into revealing your personal information. Phishing attacks start with an innocent-looking email that appears to come from a trustworthy source, but have now evolved to the extent that often neither the individual nor the organisation is even aware an incident has occurred until it is too late and confidential data has already been stolen. They are mainly designed to deceive employees, who are still seen as the ‘weakest link’, but Thawte has observed that many companies simply do not have efficient internal incident response procedures in place to alert their staff about such threats. There are a number of key processes that should be functional for an organization to be able to resist these external threats, including the length of time before a phishing email is recorded as an incident and having effective out-bound email filters implemented to prevent the leakage of sensitive data. For example, companies should be able to respond to a phishing attack within 15 minutes of receiving the malicious email. Efficiency at the early stages is crucial. Yet many of them fail to react within that time frame.
  • 5. Cybercrime – The ever-growing threat to your business 5 ® Most phishing scams are distributed through phishing emails or URLs on social media sites. On social media, there’s often a news hook, like the Ebola outbreak, or some kind of celebrity scandal that encourages people to click on links that require them to ‘login’ before they can see the details or video promised. Email distribution can also involve news hooks, but is used to phish for professional account logins, such as banking details, LinkedIn accounts and cloud file storage.3 Some emails pose as security updates or unusual activity warnings that require you to fill in your details on a phishing site, which immediately sends your details to the criminals. The origins of these phishing sites are often obscured to prevent security warnings when victims open their browsers, and this year saw a new leap forward for the criminals, with the use of AES (Advanced Encryption Standard) . The encryption is designed to make the analysis of phishing sites more difficult and a casual analysis of the page will not reveal any phishing-related content, as it is contained in the unreadable encrypted text. Browser and security software warnings are therefore less likely to appear, more victims are likely to fall for the scam and it’s harder to track4 . This is an increasingly menacing world, faceless, aggressive and highly sophisticated. And ignoring it is no protection. Any wise enterprise must assume that they are in line to be targeted, no matter where they are or what size of operation. Accepting that there is a phishing scam somewhere down the line that will have you in its sights is by far the best policy – because then you can plan exactly how to deal with the fallout and possibly spare your business untold damage. Spam The most common form of spam is unwanted email, but you can also get text message spam, instant message spam (sometimes known as spim), and social networking spam. Some spam is harmless, but at the other end of the scale, it is used as part of an identity theft scam or other kind of fraud. A common approach is for spammers to flood the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most email spam is commercial advertising, often for dubious products, get-rich-quick schemes or bogus legal services. One particularly nasty variant of email spam is sending spam to mailing lists (public or private email discussion forums). Since many mailing lists limit activity to their subscribers, spammers will use automated tools to subscribe to as many mailing lists as possible, so that they can grab the lists of addresses or use the mailing list as a direct target for their attacks. Spam is big business and the spammers keep doing it because people keep falling for their scams, clicking on links to install key loggers. One seemingly innocent such scam is to add at the end of an email a phrase such as ‘To unsubscribe, click here’, enticing the recipient to respond. By clicking and performing the action, you have told the spammer your email address is valid and reaches a real person. Spammers can now sell your address to another spammer, with the assurance that the email address is legitimate. 3 http://www.symantec.com/connect/blogs/linkedin-alert-scammers-use-security-update-phish-credentials 3 http://www.symantec.com/connect/blogs/google-docs-users-targeted-sophisticated-phishing-scam 3 http://www.symantec.com/connect/blogs/dropbox-users-targeted-phishing-scam-hosted-dropbox 4 http://www.symantec.com/connect/blogs/fresh-phish-served-helping-aes 69%2012 20142013 66% 60% On the plus side, over the last three years, states the Symantec ‘Website Security Threat Report 2015’, the overall spam rate has dropped from 69% in 2012 to 66% in 2013 and 60% in 2014
  • 6. Cybercrime – The ever-growing threat to your business 6 ® On the plus side, over the last three years, states the Symantec ‘Website Security Threat Report 2015’, the overall spam rate has dropped from 69% in 2012 to 66% in 2013 and 60% in 2014. While this is good news, there are still a lot of scams out there being sent by email – and criminals are still making plenty of money. In October, Symantec reported an increase in a particular scam where emails were sent, often to a recipient working in the finance department of a company, requesting payment by credit card or the completion of a wire transfer. The sender details were sometimes faked or made to look like they had come from the CEO, or other high-ranking member of the victim’s company, and money transfer details were either sent in an attachment or required the victim to email back and request them.5 The rise in this type of scam is most likely due to the fact that scams based on malicious attachments can be more easily filtered by corporate security systems, but many organisations are still not undertaking this simple action, despite the majority of malicious emails still relying on potentially harmful attachments. In contrast, a sharp rise in malicious URLs versus attachments at the end of the year was related to a change in tactics and surge in socially engineered spam emails. “End users should be mindful when using any social network, keeping an eye out for free offers for gadgets, gift cards and airline tickets or enticing invitations to join adult dating and webcam sites,” cautions the report. “If you are asked to fill out a survey or sign up for a service using a credit card, you are most likely being scammed.” As the old adage goes: ‘If it sounds too good to be true, it probably is.’ Identity theft Identity theft – the process of your on-line self gradually being taken over – could start when someone hacks your webmail, and then your PayPal and iTunes accounts. That becomes the passport into other accounts, until the cybercriminals who stalk the Internet, looking for easy victims, all but control your online life. Why are more and more people being caught in this deadly trap? In part, because many of us fail to properly secure our vital data and systems, using the same, easily broken, passwords (daisy chaining) across email accounts and multiple sites that we visit, leaving behind a trail of personal details from which the hackers can build a picture of exactly who we are. To criminals, business identity theft means the potential for even more easy money and goods. It involves the actual impersonation of the business itself. It can occur through the theft or misuse of key business identifiers and credentials, manipulation or falsification of business filings and records, and other related criminal activities intended to derive illicit gain to the detriment of the victimised business; and, to defraud creditors and suppliers, financial institutions, the business’ owners and officers, unsuspecting consumers, and even the government. Any type of business or organization of any size, or legal structure, is a target. Right now, someone reading this white paper will almost certainly be being groomed as another victim of identity theft – the estimated worldwide cost of which has soared to around $5 billion a year, according to the latest Microsoft Consumer Safety Index survey. 5 http://www.symantec.com/connect/blogs/malicious-links-spammers-change-malware-delivery-tactics Identity theft estimated worldwide cost $5BILLIONAYEAR
  • 7. Cybercrime – The ever-growing threat to your business 7 ® As for passwords, the ultimate problem is that it is all too often the hacker’s passport to all that’s most private and precious – a single point of failure that, once infiltrated, can open the floodgates, allowing them access to every aspect of your personal life. In the main, we are lazy and careless with our passwords, tending to daisy chain them or opt for the obvious, such as ‘password’ or ‘123456’. As for employing a short password, no matter how watertight you may think it is, modern processing speeds are able to rip through 10,000 passwords in just a few seconds. Best practice dictates that you change your passwords regularly, making them complex and strong. Vulnerabilities & malware threats While the levels of spam may be falling off slightly, the trend in the number of vulnerabilities leaving enterprises exposed to attacks is doing the exact opposite, continuing inexorably upwards. And although remedies, workarounds or patches are readily available for the majority of reported vulnerabilities, malware authors are only too aware that many people do not apply these updates – and so they are able to exploit well documented vulnerabilities. In many cases, a specialist ‘dropper’ scans for a number of known vulnerabilities and uses any unpatched security weakness as a backdoor to install malware – the short form for ‘malicious software’; ie, any kind of unwanted software installed without your consent. Viruses, worms and Trojan horses are all examples of malware. This, of course, underlines the crucial importance of applying updates; this is how web exploit toolkits, such as Sakura and Blackhole, have made it easier for attackers to exploit an unpatched vulnerability published months or even years previously. Several exploits may be created for each vulnerability, and a web attack toolkit will first perform a vulnerability scan on the browser to identify any potentially vulnerable plug-ins and the best attack that can be applied. Many toolkits won’t utilize the latest exploits for new vulnerabilities, if an old one will suffice; exploits against zero-day vulnerabilities are uncommon and highly sought after by the attackers, especially for use in ‘watering-hole’ attacks: ie, the targeted hijacking of legitimate websites to push malware. With the majority of websites still accommodating vulnerabilities, it is clear that many website owners are not keeping on top of vulnerability scans. They may be paying more attention to malware scans that could potentially reveal malicious software – yet malware is often planted following the earlier exploitation of vulnerabilities. Damage to your business So what is the likely impact of all these attacks on you and your organisation? Typically, aggressive attacks can cause prolonged disruption to internal and external business operations. Servers may be taken down completely, data wiped and digital intellectual property released on the Internet by attackers. Employees may not be able to fully function normally in the workplace for months afterwards. On top of that, such attacks may expose embarrassing internal data via social media channels — and could have a longer media cycle than a breach of credit card or personal data. However, the impact of a cyberattack goes far beyond that. The loss or theft of sensitive customer data can also have a serious impact on the economic value of a company’s reputation. Anyone affected where data has been stolen or disclosed without their consent may react by publicising the matter in social media and/or inform journalists, as well as the regulator. This can lead to a wider distrust of the company, which, in turn, can result in the blacklisting of its website, lost business and/or a fall in the share price. A company’s reputation is its greatest asset, making it imperative that business leaders take every possible step to protect themselves, customers, employees and intellectual property against data breaches and the potential fall-out from negative publicity this provokes.
  • 8. Cybercrime – The ever-growing threat to your business 8 ® A strategy that protects you Every business needs to have in place a comprehensive strategy to protect themselves against all of these points of entry – and also to detect whether they have already become unknowing victims of the growing tide of cybercrime. This is the time for organisations to take a holistic approach to the security procedures required to combat advanced threats, rather than look for a ‘silver bullet’ technology solution. A ‘hands-on’ approach by IT departments, in conjunction with external data specialists, can then help implement, review and enhance security procedures. Not acting now only opens the door wider to the likelihood of a successful attack that may well mean loss of revenue, of customer trust and the potential loss of critical data. Most worryingly, such attacks could be initiated externally or internally. While the vast majority of employees are principled and loyal to the business, there need to be systems in place to guard against those who are not. At the same time, genuine human error is equally a fact of life and may prove just as costly where it leads to a breach of your defences. With the right controls and protections in place, with help from the right provider, the guessing game of who is ethical and who is not, or who is trying to exploit your IP – or indeed already have – becomes redundant and a thing of the past. Fighting back with SSL While admittedly there is no silver bullet, a number of technologies can help protect you and your customers, and underpin business credibility. With many of the current phishing techniques relying on driving customers to spoofed websites to capture personal information, that is where technology such as Secure Sockets Layer (SSL) becomes critical in fighting phishing and the other forms of cybercrime described in this white paper – by encrypting sensitive information and authenticating your site. If you are not already using SSL, then look at it not as an option, but as a ‘must be deployed now’. The welfare of your business and its very reputation depend on it. Ultimately, security best practices call for implementing the highest levels of encryption and authentication possible to protect against cyber fraud and build customer trust in the brand. SSL, the world standard for online security, is the technology used to encrypt and protect information transmitted over the web. SSL protects data in motion – which can be intercepted and tampered with, if sent unencrypted. Moreover, support for SSL is built into all major operating systems, web browsers, Internet applications and server hardware. Choose Extended Validation (EV) SSL Certificates for the highest visible display of online trust. This is the gold standard in SSL certificates. EV verification guidelines, drawn up by the CA/ Browser Forum, require the CA to run a much more rigorous identity check on the organisation or individual applying for the certificate. Sites with an EV SSL certificate have a green browser address bar and a field appears with the name of the legitimate website owner and the name of the CA that issued the certificate. Choose Extended Validation (EV) SSL Certificates for the highest visible display of online trust
  • 9. Cybercrime – The ever-growing threat to your business 9 ® Take your security to the next level with an ‘Always-On’ approach Businesses that are serious about protecting customers and their business reputations should implement ‘Always- On SSL’, with SSL certificates from a trusted Certificate Authority such as Thawte. Always-On SSL delivers the same high level of SSL protection throughout your site, securing the visitor’s entire session with SSL, not just on forms and checkout pages. Visitors will always feel secure with the reassuring ‘HTTPS’ at the beginning of the browser address bar throughout their entire stay on your website, making it safer to search, share and shop online. What’s more, Google now favours websites that implement ‘HTTPS everywhere’/Always-On SSL, rewarding owners with an SEO ranking boost. Conclusion The ever-increasing threat from data breaches, phishing, spam, identity theft, vulnerabilities and malware means that organisations like yours can no longer afford inaction. With the cost of cybercrime in the U.S. alone heading towards $16 million per year, security technologies that underpin online business credibility and customer trust are now more vital than ever. This is why SSL is now a must-have for any organisation interested in protecting its customers and its online reputation. It’s why Always-On SSL, which protects your customers during their entire user session, is now favoured by sites like Google and is fast becoming the new standard in website security. And it’s also why Thawte is here to provide you with all the expertise and website security technology you need.
  • 10. Cybercrime – The ever-growing threat to your business 9 ® Green bar Increase your conversions and reduce fraud with the Thawte Green Bar. Not All SSL Is the Same Thawte online security is trusted by millions of people around the world. Here are just a few reasons to switch to Thawte: Strongest SSL Encryption Protect your confidential data with 256-bit SSL encryption and $1.5m USD Warranty. Lightning Fast OCSP Speed Faster Online Certificate StatusProtocol (OCSP) response delivers an optimised customer experience. Thawte Certification Center Buy, renew, and manage certificates with a single, secure sign-in to Thawte® Certificate Center. Scalability Thawte grows with you. Ourinfrastructure supports more revocation checking globally than all other Certificate Authorities combined. Uncompromised Infrastructure Thawte is the 1st International SSL certificate provider and has never been breached or compromised. Delivering 100% planned uptime. Industry Leading Support Easy enrolment, installation help and world class multi-lingual expert support help you get up and running fast. Money-back Guarantee We provide a 30 day, no questions asked, money-back guarantee to ensure you are satisfied with your purchase.
  • 11. More Information If you have further questions, or would like to speak with a Sales Advisor, please feel free to contact us: Via phone US toll-free: +1 888 484 2983 UK: +44 203 450 5486 South Africa: +27 21 819 2800 Germany: +49 69 3807 89081 France: +33 1 57 32 42 68 Email sales@thawte.com Visit our website at https://www.thawte.com/ssl © 2015 Thawte, Inc. All rights reserved. Thawte, the Thawte logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Thawte, Inc. and its subsidiaries and affiliates in the United States and in foreign countries. All other trademarks are property of their respective owners. Protect your business and translate trust to your customers with high-assurance digital certificates from Thawte, the world’s first international specialist in online security. Backed by a 17-year track record of stability and reliability, a proven infrastructure, and world-class customer support, Thawte is the international partner of choice for businesses worldwide. BUY TRY LEARN MORE