Click me
Transcribed

Hackers Are Stealing Your Business' Data

HACKERS ARE STEALING YOUR BUSINESS' DATA. Fraudsters have a number of methods to gain access to sensitive personal and business information. Here's how they are doing it and how stolen information negatively impacts your business. HERE'S HOW: 1) MALWARE 2) BREACH 3) INTERNAL EXTRACTION МЕТHOD 1 DON'T CLICK THAT LINK! MALWARE FRAUD Someone within the company infects their computer with malware by clicking on a malicious link in an email or website, or by visiting a legitimate website that is infected with drive-by malware. This malware sends sensitive information - like login credentials - to the criminal's server, giving the hacker complete access to the compromised device and the company's internal network. The criminal sells the stolen information on the Internet black market. ANTIVIRUS TECHNOLOGIES DETECT LESS THAN 5% MALWARE LURES THE UNWITTING & OF MALWARE IN THE WILD. PREYS ON HUMAN FALLIBILITY. METHOD 2 BREACH FRAUD KNOW YOUR WEAKNESSES A criminal finds a vulnerable website and hacks it to obtain a list of user login credentials. The criminal cracks any encrypted passwords and shares the stolen credentials on hacker forums. Using automated tools, stolen credentials are matched with credentials on major websites - including online merchants, social networks and financial institutions. IN 2011 98% OF BREACHES ORIGINATED FROM EXTERNAL AGENTS, AND 81% INVOLVED HACKING. FRAUDSTERS PICK AT HOLES & WEAK POINTS, FROM THE OUTSIDE IN. 3 INTERNAL EXTRACTION FRAUD МЕТНOD An employee, ex-employee or fraudster imitating an employee dumps company data onto an external storage source. Intent is not always malicious, but the data becomes compromised in some way. A criminal may discover and share the data on hacker forums for reuse, or attempt to log into accounts directly. PROTECT FROM ALL ANGLES 66% OF ORGANIZATIONS FEEL VULNERABLE TO BREACH DUE TO NEGLIGENT EMPLOYEES, TEMPORARY EMPLOYEES DATA LEAKS FROM THE INSIDE, OR CONTRACTORS. WITH OR WITHOUT MALICIOUS INTENT. WHAT IS YOUR DATA WORTH TO A HACKER? 100 emails & passwords Social Security Number & DOB eBay account $0 $5 $10 $15 $20 $25 $30 Credit card with security code & exp. date PayPal account with balance or verified Credit card with full identifying information (name, security code, exp. date, address, phone number) WHAT IS THE IMPACT ON YOUR BUSINESS? $ ) High remediation costs. $7.2M The average $750K – $31M cost of a data The lowest and highest breach breach in 2010. remediation costs in 2010. Revealed sensitive intellectual property & customer data. 174 MILLION 31% of data breaches in 2010 were Records were compromised in 2012. malicious, and this number is rising. Negative impact on public brand perception & customer trust. 8 MONTHS 12% 18% Average diminished value of a brand O with breached customer data. Average time it takes to restore the reputation of a breached oranization. Average diminished value of a brand with breached intellectual property. SOURCES IMPERVA, 2013 VERIZON, 2012 PONEMON INSTITUTE, 2012 CSID CSID, 2012 PONEMON INSTITUTE, 2011 HACKERS ARE STEALING YOUR BUSINESS' DATA. Fraudsters have a number of methods to gain access to sensitive personal and business information. Here's how they are doing it and how stolen information negatively impacts your business. HERE'S HOW: 1) MALWARE 2) BREACH 3) INTERNAL EXTRACTION МЕТHOD 1 DON'T CLICK THAT LINK! MALWARE FRAUD Someone within the company infects their computer with malware by clicking on a malicious link in an email or website, or by visiting a legitimate website that is infected with drive-by malware. This malware sends sensitive information - like login credentials - to the criminal's server, giving the hacker complete access to the compromised device and the company's internal network. The criminal sells the stolen information on the Internet black market. ANTIVIRUS TECHNOLOGIES DETECT LESS THAN 5% MALWARE LURES THE UNWITTING & OF MALWARE IN THE WILD. PREYS ON HUMAN FALLIBILITY. METHOD 2 BREACH FRAUD KNOW YOUR WEAKNESSES A criminal finds a vulnerable website and hacks it to obtain a list of user login credentials. The criminal cracks any encrypted passwords and shares the stolen credentials on hacker forums. Using automated tools, stolen credentials are matched with credentials on major websites - including online merchants, social networks and financial institutions. IN 2011 98% OF BREACHES ORIGINATED FROM EXTERNAL AGENTS, AND 81% INVOLVED HACKING. FRAUDSTERS PICK AT HOLES & WEAK POINTS, FROM THE OUTSIDE IN. 3 INTERNAL EXTRACTION FRAUD МЕТНOD An employee, ex-employee or fraudster imitating an employee dumps company data onto an external storage source. Intent is not always malicious, but the data becomes compromised in some way. A criminal may discover and share the data on hacker forums for reuse, or attempt to log into accounts directly. PROTECT FROM ALL ANGLES 66% OF ORGANIZATIONS FEEL VULNERABLE TO BREACH DUE TO NEGLIGENT EMPLOYEES, TEMPORARY EMPLOYEES DATA LEAKS FROM THE INSIDE, OR CONTRACTORS. WITH OR WITHOUT MALICIOUS INTENT. WHAT IS YOUR DATA WORTH TO A HACKER? 100 emails & passwords Social Security Number & DOB eBay account $0 $5 $10 $15 $20 $25 $30 Credit card with security code & exp. date PayPal account with balance or verified Credit card with full identifying information (name, security code, exp. date, address, phone number) WHAT IS THE IMPACT ON YOUR BUSINESS? $ ) High remediation costs. $7.2M The average $750K – $31M cost of a data The lowest and highest breach breach in 2010. remediation costs in 2010. Revealed sensitive intellectual property & customer data. 174 MILLION 31% of data breaches in 2010 were Records were compromised in 2012. malicious, and this number is rising. Negative impact on public brand perception & customer trust. 8 MONTHS 12% 18% Average diminished value of a brand O with breached customer data. Average time it takes to restore the reputation of a breached oranization. Average diminished value of a brand with breached intellectual property. SOURCES IMPERVA, 2013 VERIZON, 2012 PONEMON INSTITUTE, 2012 CSID CSID, 2012 PONEMON INSTITUTE, 2011

Hackers Are Stealing Your Business' Data

shared by JessicaWarren on Feb 06
305 views
1 shares
0 comments
Fraudsters have a number of methods to gain access to sensitive personal and business information. Here's how they are doing it, how stolen information negatively impacts your business, and what you can do.

Publisher

CSID

Source

Unknown. Add a source

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size