SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
THE DARK SIDE
OF THE WEB
Q4 2014 Published Q1 2015
we create as much information as we did
from the dawn of human civilization up until 2003
EVERY 2 DAYS
does William Shatner wear a toupee?
Google now searches
35 TRILLION WEBPAGES
That’s 4,375 times the size of the web just 10 years ago
And there are thousands of cloud apps
that can make you more productive
The average employee uses
27 apps at work
Collaboration
Social Media
Content Sharing
File Sharing
Business Intelligence
Other
HERE ARE SOME OF THE TOP APPS IN USE
1. Dropbox
2. Google Drive
3. Box
4. OneDrive
5. ShareFile
6. Yandex.Disk
7. Hightail
8. 4shared
9. Firedrive
10. Zippyshare
TOP
SERVICES
by category
FILE SHARING COLLABORATION SOCIAL MEDIA
1.
2. Gmail
3. Yammer
4. Yahoo! Mail
5. Cisco WebEx
6. Google Apps
7. Skype
8. Evernote
9. Prezi
10. GoToMeeting
Microsoft
Office 365
1. Facebook
2. Twitter
3. LinkedIn
4. Tumblr
5. Sina Weibo
6. VK
7. Foursquare
8. Badoo
9. LiveJournal
10. Renren
THESE FILE-SHARING
APPS ARE NOW THE
HOME OF SENSITIVE DATA
of files uploaded to file-sharing
services contain sensitive data
of users have uploaded sensitive
data to a file-sharing service22% 37%
DOWNLOAD NOW
CLOUD ADOPTION
& RISK REPORT
Q3 2014
Published Q4 2014
Download the Full Report
Get the full report with
detailed statistics on the
top cloud services,
fastest growing apps,
and risks you can avoid
in the cloud.
CLOUD ADOPTION
& RISK REPORT
Q4 2014
Published Q1 2015
It’s estimated the “dark web” or “deep web” is 500
times larger than what’s searchable by Google
THE REACH AND ANONYMITY OF
THE WEB MAKE ITS DARK
CORNERS THE PERFECT BLACK MARKET
ON DARK WEB MARKETPLACES
SUCH AS THE NOW-DEFUNCT
SILK ROAD, YOU CAN BUY:
DRUGS
WEAPONS
HITMEN
FORGED
PASSPORTS
YOU CAN ALSO BUY STOLEN
LOGIN CREDENTIALS
PASSWORD
**********
HOW BIG IS THIS PROBLEM?
OF COMPANIES HAVE AT LEAST 1 EMPLOYEE
WITH COMPROMISED CREDENTIALS92%
One Fortune 500 company has
10,155 compromised credentials
including file sharing, collaboration,
CRM, and financial applications
AND 12% OF ALL USERS HAVE AT LEAST
ONE COMPROMISED CREDENTIAL
Financial
Government
Healthcare
High tech
Manufacturing
Media
Pharmaceutical
Real estate
Telecommunications
Utilities
Energy
9%
6%
5%
15%
9%
14%
12%
19%
9%
18%
11%
% of employees with at least one password stolen
INDUSTRIES
MOST EXPOSED
TO COMPROMISED
ACCOUNTS
Tip: to limit your exposure don’t be one of the 31%
of people who reuse passwords across apps
Use a strong, unique password for every single app and change
the most important ones every 3 months
DOWNLOAD NOW
CLOUD ADOPTION
& RISK REPORT
Q3 2014
Published Q4 2014
Download the Full Report
Get the full report with
detailed statistics on the
top cloud services,
fastest growing apps,
and risks you can avoid
in the cloud.
CLOUD ADOPTION
& RISK REPORT
Q4 2014
Published Q1 2015

Contenu connexe

Tendances

Tendances (20)

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
 
BeYOnD BYOD
BeYOnD BYODBeYOnD BYOD
BeYOnD BYOD
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportSummer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud Report
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
[Infographic] Productivity in the Cloud
[Infographic] Productivity in the Cloud[Infographic] Productivity in the Cloud
[Infographic] Productivity in the Cloud
 
Megatrends and Data - Adapting to Disruption
Megatrends and Data - Adapting to DisruptionMegatrends and Data - Adapting to Disruption
Megatrends and Data - Adapting to Disruption
 
Cloud computing in Thailand readiness survey
Cloud computing in Thailand readiness surveyCloud computing in Thailand readiness survey
Cloud computing in Thailand readiness survey
 
The attention economy and the internet
The attention economy and the internetThe attention economy and the internet
The attention economy and the internet
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityStop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes Mobile
 
Predictions idc2013
Predictions idc2013Predictions idc2013
Predictions idc2013
 
Ravi Namboori - Developing Cloud Applications In The New IT Era
Ravi Namboori - Developing Cloud Applications In The New IT EraRavi Namboori - Developing Cloud Applications In The New IT Era
Ravi Namboori - Developing Cloud Applications In The New IT Era
 
Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?
 
Top tips to develop your enterprise mobility strategy [Infographic]
Top tips to develop your enterprise mobility strategy [Infographic]Top tips to develop your enterprise mobility strategy [Infographic]
Top tips to develop your enterprise mobility strategy [Infographic]
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
 
Importance of web application development
Importance of web application developmentImportance of web application development
Importance of web application development
 
Codeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWSCodeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWS
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
 

En vedette

How to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink YouHow to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink You
Skyhigh Networks
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - Chandna
Asheem Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
Sergio Loureiro
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - Frantic
Miika Puputti
 

En vedette (9)

How to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink YouHow to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink You
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - Frantic
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done Right
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 

Similaire à The Dark Side of the Web

Security that works
Security that worksSecurity that works
Security that works
James1280
 
Internet of Things - Industry Influence Study
Internet of Things - Industry Influence StudyInternet of Things - Industry Influence Study
Internet of Things - Industry Influence Study
Real-Time Innovations (RTI)
 

Similaire à The Dark Side of the Web (20)

Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012
 
The Digital Workplace Revolution
The Digital Workplace RevolutionThe Digital Workplace Revolution
The Digital Workplace Revolution
 
What is 'Cloud Computing'?
What is 'Cloud Computing'?What is 'Cloud Computing'?
What is 'Cloud Computing'?
 
Cloud Computing - An Introduction to Cloud Computing Services
Cloud Computing - An Introduction to Cloud Computing ServicesCloud Computing - An Introduction to Cloud Computing Services
Cloud Computing - An Introduction to Cloud Computing Services
 
SxSW: Can we save the open web?
SxSW: Can we save the open web?SxSW: Can we save the open web?
SxSW: Can we save the open web?
 
Can we save the open web?
Can we save the open web?Can we save the open web?
Can we save the open web?
 
Employing cloud ian moyse - workbooks - whitepaper
Employing cloud   ian moyse - workbooks - whitepaperEmploying cloud   ian moyse - workbooks - whitepaper
Employing cloud ian moyse - workbooks - whitepaper
 
Why hybrid cloud continues to grow: A look at real use cases
Why hybrid cloud continues to grow: A look at real use casesWhy hybrid cloud continues to grow: A look at real use cases
Why hybrid cloud continues to grow: A look at real use cases
 
Nonprofit and Library Technology Trends for 2019
Nonprofit and Library Technology Trends for 2019Nonprofit and Library Technology Trends for 2019
Nonprofit and Library Technology Trends for 2019
 
Security that works
Security that worksSecurity that works
Security that works
 
Internet of Things - Industry Influence Study
Internet of Things - Industry Influence StudyInternet of Things - Industry Influence Study
Internet of Things - Industry Influence Study
 
5 tech trends to watch in 2011
5 tech  trends to watch in 20115 tech  trends to watch in 2011
5 tech trends to watch in 2011
 
Secrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the sceneSecrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the scene
 
SUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of businessSUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of business
 
The 10 best performing document management solution providers 2018
The 10 best performing document management solution providers 2018The 10 best performing document management solution providers 2018
The 10 best performing document management solution providers 2018
 
The Digital Marketing Revolution: 22 years in 16 charts
The Digital Marketing Revolution: 22 years in 16 chartsThe Digital Marketing Revolution: 22 years in 16 charts
The Digital Marketing Revolution: 22 years in 16 charts
 
Ap i ot_1407
Ap i ot_1407Ap i ot_1407
Ap i ot_1407
 
The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change) The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change)
 
Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015
 
Six Sites Short
Six Sites ShortSix Sites Short
Six Sites Short
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

The Dark Side of the Web

  • 1. THE DARK SIDE OF THE WEB Q4 2014 Published Q1 2015
  • 2. we create as much information as we did from the dawn of human civilization up until 2003 EVERY 2 DAYS
  • 3. does William Shatner wear a toupee? Google now searches 35 TRILLION WEBPAGES That’s 4,375 times the size of the web just 10 years ago
  • 4. And there are thousands of cloud apps that can make you more productive
  • 5. The average employee uses 27 apps at work Collaboration Social Media Content Sharing File Sharing Business Intelligence Other
  • 6. HERE ARE SOME OF THE TOP APPS IN USE
  • 7. 1. Dropbox 2. Google Drive 3. Box 4. OneDrive 5. ShareFile 6. Yandex.Disk 7. Hightail 8. 4shared 9. Firedrive 10. Zippyshare TOP SERVICES by category FILE SHARING COLLABORATION SOCIAL MEDIA 1. 2. Gmail 3. Yammer 4. Yahoo! Mail 5. Cisco WebEx 6. Google Apps 7. Skype 8. Evernote 9. Prezi 10. GoToMeeting Microsoft Office 365 1. Facebook 2. Twitter 3. LinkedIn 4. Tumblr 5. Sina Weibo 6. VK 7. Foursquare 8. Badoo 9. LiveJournal 10. Renren
  • 8. THESE FILE-SHARING APPS ARE NOW THE HOME OF SENSITIVE DATA of files uploaded to file-sharing services contain sensitive data of users have uploaded sensitive data to a file-sharing service22% 37%
  • 9. DOWNLOAD NOW CLOUD ADOPTION & RISK REPORT Q3 2014 Published Q4 2014 Download the Full Report Get the full report with detailed statistics on the top cloud services, fastest growing apps, and risks you can avoid in the cloud. CLOUD ADOPTION & RISK REPORT Q4 2014 Published Q1 2015
  • 10. It’s estimated the “dark web” or “deep web” is 500 times larger than what’s searchable by Google
  • 11. THE REACH AND ANONYMITY OF THE WEB MAKE ITS DARK CORNERS THE PERFECT BLACK MARKET
  • 12. ON DARK WEB MARKETPLACES SUCH AS THE NOW-DEFUNCT SILK ROAD, YOU CAN BUY: DRUGS WEAPONS HITMEN FORGED PASSPORTS
  • 13. YOU CAN ALSO BUY STOLEN LOGIN CREDENTIALS PASSWORD **********
  • 14. HOW BIG IS THIS PROBLEM?
  • 15. OF COMPANIES HAVE AT LEAST 1 EMPLOYEE WITH COMPROMISED CREDENTIALS92%
  • 16. One Fortune 500 company has 10,155 compromised credentials including file sharing, collaboration, CRM, and financial applications
  • 17. AND 12% OF ALL USERS HAVE AT LEAST ONE COMPROMISED CREDENTIAL
  • 19. Tip: to limit your exposure don’t be one of the 31% of people who reuse passwords across apps Use a strong, unique password for every single app and change the most important ones every 3 months
  • 20. DOWNLOAD NOW CLOUD ADOPTION & RISK REPORT Q3 2014 Published Q4 2014 Download the Full Report Get the full report with detailed statistics on the top cloud services, fastest growing apps, and risks you can avoid in the cloud. CLOUD ADOPTION & RISK REPORT Q4 2014 Published Q1 2015