Click me
Transcribed

IT Security Statistics, why you should be afraid

IT SECURITY STATISTICS 160 MILLION CREDIT CARD NUMBERS IN LARGEST DATA THEFT CASE EVER PROSECUTED IN THE U.S. 37% OF HACKED COMPANIES WERE FINANCIAL FIRMS; 24% WERE RETAILERS AND RESTAURANTS; 20% INVOLVED MANUFACTURING, TRANSPORTATION AND UTILITY INDUSTRIES; AND 19% OF THE BREACHES AFFECTED ORGANIZATIONS THAT WERE INFORMATION AND PROFESSIONAL SERVICES FIRMS 24% 20% 19% 37% HACKING WILL COST WORLD 1,600,000,000,000 IN 2013 IN A RECENT SURVEY IT WAS REPORTED THAT 90% OF ALL BUSINESSES SUFFERED SOME SORT OF COMPUTER HACK OVER THE PAST 12 MONTHS AND 77% OF THESE COMPANIES FELT THAT THEY WERE SUCCESSFULLY ATTACKED SEVERAL TIMES OVER THE SAME PERIOD OF TIME 90% SECURITY EXPERTS LIKE TO SAY THAT THERE ARE NOW ONLY TWO TYPES OF COMPANIES LEFT IN THE UNITED STATES: THOSE THAT HAVE BEEN HACKED AND THOSE THAT DON'T KNOW THEY'VE BEEN HACKED. TOP 10 SOURCES OF PHISHING EMAILS USA 25.4 UK 8.2 GERMANY 7.7 RUSSIA 6.0 INDIA 5.1 CANADA 4.5 AUSTRALIA 3.9 FRANCE |3.6 ITALY 2.4 POLAND 2.4 WHAT IS A PHISHING EMAIL Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well known and trustworthy Web sites. 5 WORST COMPUTER VIRUSES MELISSA THE ANNA KOURNIKOVA VIRUS SASSER & NETSKY MYDOOM 2007 STORM WORM SHOCKINGLY, WHILE NEARLY HALF OF ALL SMALL AND MEDIUM U.S. BUSINESSES (SMBS) HAVE BEEN INFECTED BY VIRUSES OR MALWARE THIS YEAR, MANY ARE STILL OPERATING WITHOUT AN INTERNET SAFETY NET. 31% 23% 15% ARE OPERATING WITHOUT ANTI-SPAM SOFTWARE HAVE NO ANTI-SPYWARE HAVE NO FIREWALL KEYSPACE ARE A BRISBANE, AUSTRALIA BASED IT SECURITY COMPANY THAT CAN HELP PROTECT YOU AND YOUR BUSINESS FROM HACKING, SPAM AND VIRUSES. CALL US NOW ON 07 3200 1986 AND WE CAN HELP YOU SLEEP AT NIGHT

IT Security Statistics, why you should be afraid

shared by billytrail on Dec 02
48 views
1 shares
0 comments
Some scary statisitcs on It security and threats, costs and impact.

Tags

computing

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size