Click me
Transcript

Symantec Secure Computing

Secure Computing as Threats Evolve Symantec's authoritative 2014 Internet Security Threat Report shows a marked decrease in many forms of malware and product vulnerabilities, plus faster responses to zero-day attacks. Data breaches are of paramount concern, but the median number of records compromised per breach is going down. 8,350 median number of identities exposed per breach in 2012 6,777 in 2013 a19% drop Mobile and browser vulnerabilities have fallen sharply since 2012. Documented browser vulnerabilities Documented mobile 891 in 2012 vulnerabilities 351 in 2013 416 in 2012 a 60% drop 127 in 2013 a 69% drop Unique malicious Web domains 74,001 in 2012 56,158 in 2013 a 24% drop Email spam bots are being detected and neutralized more effectively. runn a 33% drop nunn rurun 2.3 million spam bots in 2013 3.4 million spam bots in 2012 Compromised Web sites went up 25% from 2012 to 2013. Web site vulnerabilities went up 28% from 2012 to 2013. Hackers are moving away from broad attacks in favor of highly targeted, socially engineered infiltration. Although the number of spear phishing emails dropped by 28% from 2012 to 2013... ... and the number of recipients per campaign decreased by 79% ... ... the number of spear phishing campaigns increased by 91% and lasted 3x longer Symantec is blocking more attacks, more quickly each year. 190,000 in 2011 464,100 in 2012 568,700 in 2013 Number of top 5 zero-day threats blocked by Symantec after Internet Security Threat Report release date 20,813 exploit attempts blocked within 5 days of releasing the report 37,555 exploit attempts blocked within 10 days of releasing the report 174,651 exploit attempts blocked within 30 days of releasing the report O Symantec. Source: Symantec 2014 Internet Security Threat Report

Symantec Secure Computing

shared by ohdangmonica on Oct 17
122 views
0 shares
0 comments
Infograchic for Symantec about secure computing as threats evolve

Publisher

Symantec

Designer

squarehand

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size