Click me
Transcribed

Cyber Attacks

OR 10 101 Cyber Threats, BННО to your Business Cyber attacks are growing and pose a serious threat to any business with poor and unmanaged IT systems. Whata Small Business Needs to KnOW About Cyber Threats.In Numbers. 1001001 010101 1841010010 0101010000 4x Increase to1 101010010100o 11011110100 No.10000110 The number of vulnerabilities identified across the top 20 applications010101010010100B over a 3 month period Banking Trojans increase by 4 times at the start of 2014 Chrome identified as the top product for cyber security vulnerabilities RNAME0000101010101010101010010 001001000PASSWORD1010d11000010 TT% 10101010 10010 7x Increase 010 52% 10010 INOC Of 400 businesses surveyed (<50 employees), 77% had been victims of Cyber Attack... SPAM 1010001101011 Social Media SPAM has increased 7 fold 1010110101000 10100 10100 Percentage of employees that ignore company policy on data security = Data 0101010010101010101001010 Leakage 10101 since Mid-2013 000001 01010101001010101010100 2010101001001 |Vulnerable Applications Used by Fraudsters 2% Microsoft Office 4% Adobe Flash Player 10001 1 1011000 4% C010 8% Adobe Reader 1010 1016 0100 0101 AndroidOS 53% 1001 Browsers 000100 1200 1001 1010 10 010 0011 0100 d1010 .1001 1010 29% Oracle Java The distribution of exploits used by fraudsters, by type of application attacked, Q2 2014 927,568 Financial MalwareAttacks 341216 %3D 336540 러 012 April May June How does your Anti-Virus Software compare Real-World Protection Test - 0ctober 2014 100% 60 95% 50 90% 85% 40 80% 30 75% 20 70% 65% 10 60% Fortinet Kaspersky Kingsoft AVG MCAfree Panda BitDefender F - Secure | Compromised | User dependent | Blocked o False Positives *** Out-of-box protection (blocked) by Microsoft Windows Failure to patch (perform security updates) can have serious ramifications including exposure of confidential business and personal data. ! What Can Be Done to Prevent Attack? HAVE A RECOVERY PLAN 110000101011 110001101001 010 0111 25% 10010101010110 00101011010014 10101 0101 01010 of business fail to open again after a major disaster 10 75% of business owners don't have any disaster recovery DISASTER RECOVERY 21 24% PREVENTION = the reduction in IT infrastructure costs experienced by deploying managed services Customers who implemented a managed services program mitigated downtime by this percentage = 64% PREVENTION CAN HELP U GOOD MANAGED PRACTICE 4 steps of a professional Managed Services framework: Identify Remote Monitoring & Management Resolve Prevent & Monitor References news.softpedia.com/news/Top-20-Most-Vulnerable-Software-in-Q3-2014-466965.shtm#sgal_0 securelist.com/analysis/quarterly-malware-reports/65340/it-threat-evolution-q2-2014/ www.theguardian.com/media-network/nominet-partner-zone/cyber-security-small-business-risks business.tutsplus.com/tutorials/are-you-prepared-how-to-make-a-disaster-recovery-plan-for-your-business--cms-21089 OERS Computer Solutions ers.je AhnLab avasti AVIRA npjeg BullGuard Emsisoft eScan ESET False Positives Lavasoft Qihoo - 360 Sophos Tencent - 0Q ThreatTrack Vipre Trend Micro || ||

Cyber Attacks

shared by colmstafford on Jan 26
230 views
0 shares
0 comments
This info-graphic covers some interesting data about the topical concern that is cyber attacks. The graphic outlines some key statistics which may shock but it also suggests areas where small business...

Publisher

Colm

Category

Business
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size