SlideShare una empresa de Scribd logo
1 de 17
Achilles Heel of Email
Think Stock
www.cloudnician.com
by
James O. Grundvig
EVOLUTION OF
EMAIL
2
Route 80 Project
North Jersey
NJ-DOT HQ
Trenton, NJ
12 kb file
(Cover Sheet)
1 9 9 2
Email Replaces Fax One Page at a Time
email
20 Minutes – 60 Miles
Think Stock Think Stock
3
 10 million email accounts
 16 million Internet users
 25,000 websites
 Dial-up Internet Service
THE BIG BANG
INTERNET
1 9 9 5
Netscape’s Web Browser Opens the Internet
Think Stock
4
TIMELINE
TSUNAMI OF
SPAM EMAIL
SPAM
E
V
E
N
T
2004 2009 2013
Spam
costs
firms
$130
billion
5
Spammers
arrested
DropBox
Users
complain
of Spam
1995
10m
email
3.6 B
email
Think Stock
5
SOCIAL ENGINEERING
OF EMAIL
2 0 1 2
Hackers Exploit People
 Your friends can be used
against you
Think Stock
 People are the weak link
 Data Trolls your online life
 29% of cyber attacks are
conducted via email
DE-EVOLUTION OF
EMAIL
email
6
Think Stock Think Stock Think Stock
BRIGHT IDEA
OF EMAIL…
1 to Many
Communication
Send Attached Files
Become more
productive but. . .
email
7Think Stock
8
15 hrs
week
$28,000/yr
Lost time
 918 million corporate email
accounts
 105 emails sent per user
INEFFICIENCY
OF EMAIL
 300 million emails sent each
day are “poison darts”
 37% users don’t reply to email
 Email wasn’t designed to be
collaborative
9
DATA BREACH COSTS
TELECOM GIANT
“High-tech spies managed to infiltrate Telenor’s extensive security
network and empty the contents of the top executives’ personal
computers.” – Afterposten 3-17-13.
Telenor
$18B
31K
20
monitor
traffic
1open
zip file
Rev.
Employ.
10
MORE DATA BREACHES
BY EMAIL
2012
Attacks
- 68.2% done by hackers
- 267 million records exposed
- 1 email exposed S. Carolina’s
3.8 million tax returns
- Evernote didn’t follow own
training: employee opened
“reset” password email (4-19-13)
email
11Think Stock
HEALTHCARE
EXPOSURE TO EMAIL H
12
BOSTON MARATHON
BOMBING
Wounded Suspect brought to
Beth Israel Deaconess MC…
Halls
Empty
Police
Lockdown
Hospital
What if a Terrorist launched a
Cyber Attack on the IT Systems?
H
Think Stock
13
Patient Privacy
& Data Security H
 $2.4 million (2-year) avg.
cost to organization in PHI
 45% claim >5 breaches (up
from 29% in 2010)
 2,769 stolen records/breach
 75% don’t secure medical
devices contain patient data
 94% have leaked data
14
WHICH PATIENT DATA
BREACH IS WORSE? H
 Class-Action lawsuit Glen Falls Hospital NY
 Class-Action lawsuit 22 Florida Hospitals
 Wyoming Doctor’s personal email exposes
2,900 patient records
 Oregon H&SU hacked twice in same year
 2 Breaches, 2 States, 2 Hospitals, Same Day
– Utah & Mississippi
15
CAN WE SECURE DATA?
email
ePhish training
won’t work
Think Stock
16
SEPARATION OF
EMAIL & STATE
EMAIL
SERVER
Off-Premise
Cloud
Corporate IT Network
(on-premise)
External
Communication
FIREWALL
Few Employees
have email
Is this the New Paradigm?
17
NEW CHALLENGE
OF BYOD
Off-Premise
Cloud
DB1
DB3
DB2
- Remote locations
- Multiple devices
- How do we Secure?
Think Stock

Más contenido relacionado

Destacado

Final Project - ITC5330
Final Project - ITC5330Final Project - ITC5330
Final Project - ITC5330driscolljl
 
Kisah katak (Konsep kendiri)
Kisah katak (Konsep kendiri)Kisah katak (Konsep kendiri)
Kisah katak (Konsep kendiri)Siti Nor Fatimah
 
Tiger Capabilities
Tiger CapabilitiesTiger Capabilities
Tiger CapabilitiesAndre Hollis
 
crusades-elorm, julia, emley, collin
crusades-elorm, julia, emley, collincrusades-elorm, julia, emley, collin
crusades-elorm, julia, emley, collinjuliastolfus
 
PINsafe by SWIVEL
PINsafe by SWIVELPINsafe by SWIVEL
PINsafe by SWIVELajldr
 
Duncan enterprises is a regional reseller of epaymentamerica
Duncan enterprises is a regional reseller of epaymentamericaDuncan enterprises is a regional reseller of epaymentamerica
Duncan enterprises is a regional reseller of epaymentamericaDuncanEnterprises
 
Diferencias entre enrutamiento estático y dinámico
Diferencias entre enrutamiento estático y dinámicoDiferencias entre enrutamiento estático y dinámico
Diferencias entre enrutamiento estático y dinámicoEduardo Lange
 

Destacado (13)

Final Project - ITC5330
Final Project - ITC5330Final Project - ITC5330
Final Project - ITC5330
 
25 de mayo
25 de mayo25 de mayo
25 de mayo
 
Kisah katak (Konsep kendiri)
Kisah katak (Konsep kendiri)Kisah katak (Konsep kendiri)
Kisah katak (Konsep kendiri)
 
Part 1
Part 1Part 1
Part 1
 
Conocimiento
ConocimientoConocimiento
Conocimiento
 
Tiger Capabilities
Tiger CapabilitiesTiger Capabilities
Tiger Capabilities
 
crusades-elorm, julia, emley, collin
crusades-elorm, julia, emley, collincrusades-elorm, julia, emley, collin
crusades-elorm, julia, emley, collin
 
Part 1
Part 1Part 1
Part 1
 
Fisiopatología del dolor gus
Fisiopatología del dolor  gusFisiopatología del dolor  gus
Fisiopatología del dolor gus
 
PINsafe by SWIVEL
PINsafe by SWIVELPINsafe by SWIVEL
PINsafe by SWIVEL
 
Duncan enterprises is a regional reseller of epaymentamerica
Duncan enterprises is a regional reseller of epaymentamericaDuncan enterprises is a regional reseller of epaymentamerica
Duncan enterprises is a regional reseller of epaymentamerica
 
Bus inovation for the future
Bus inovation for the futureBus inovation for the future
Bus inovation for the future
 
Diferencias entre enrutamiento estático y dinámico
Diferencias entre enrutamiento estático y dinámicoDiferencias entre enrutamiento estático y dinámico
Diferencias entre enrutamiento estático y dinámico
 

Similar a Email IT Security Breaches

Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decadestudentinternetdeals33
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...FecomercioSP
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistanFahad Abbasi
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risksrothl
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risksrothl
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)Neeraj Mahajan
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxsmile790243
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceDulanja Liyanage
 
eCrime Conference March 2006
eCrime Conference March 2006eCrime Conference March 2006
eCrime Conference March 2006Alan Mather
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022ndcmanagement
 
Report on hacking crime and workable solution
Report on hacking crime and workable solutionReport on hacking crime and workable solution
Report on hacking crime and workable solutionShohag Prodhan
 

Similar a Email IT Security Breaches (20)

Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
 
eCrime Conference March 2006
eCrime Conference March 2006eCrime Conference March 2006
eCrime Conference March 2006
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
Report on hacking crime and workable solution
Report on hacking crime and workable solutionReport on hacking crime and workable solution
Report on hacking crime and workable solution
 

Último

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Último (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Email IT Security Breaches

  • 1. Achilles Heel of Email Think Stock www.cloudnician.com by James O. Grundvig
  • 2. EVOLUTION OF EMAIL 2 Route 80 Project North Jersey NJ-DOT HQ Trenton, NJ 12 kb file (Cover Sheet) 1 9 9 2 Email Replaces Fax One Page at a Time email 20 Minutes – 60 Miles Think Stock Think Stock
  • 3. 3  10 million email accounts  16 million Internet users  25,000 websites  Dial-up Internet Service THE BIG BANG INTERNET 1 9 9 5 Netscape’s Web Browser Opens the Internet Think Stock
  • 4. 4 TIMELINE TSUNAMI OF SPAM EMAIL SPAM E V E N T 2004 2009 2013 Spam costs firms $130 billion 5 Spammers arrested DropBox Users complain of Spam 1995 10m email 3.6 B email Think Stock
  • 5. 5 SOCIAL ENGINEERING OF EMAIL 2 0 1 2 Hackers Exploit People  Your friends can be used against you Think Stock  People are the weak link  Data Trolls your online life  29% of cyber attacks are conducted via email
  • 7. BRIGHT IDEA OF EMAIL… 1 to Many Communication Send Attached Files Become more productive but. . . email 7Think Stock
  • 8. 8 15 hrs week $28,000/yr Lost time  918 million corporate email accounts  105 emails sent per user INEFFICIENCY OF EMAIL  300 million emails sent each day are “poison darts”  37% users don’t reply to email  Email wasn’t designed to be collaborative
  • 9. 9 DATA BREACH COSTS TELECOM GIANT “High-tech spies managed to infiltrate Telenor’s extensive security network and empty the contents of the top executives’ personal computers.” – Afterposten 3-17-13. Telenor $18B 31K 20 monitor traffic 1open zip file Rev. Employ.
  • 10. 10 MORE DATA BREACHES BY EMAIL 2012 Attacks - 68.2% done by hackers - 267 million records exposed - 1 email exposed S. Carolina’s 3.8 million tax returns - Evernote didn’t follow own training: employee opened “reset” password email (4-19-13) email
  • 12. 12 BOSTON MARATHON BOMBING Wounded Suspect brought to Beth Israel Deaconess MC… Halls Empty Police Lockdown Hospital What if a Terrorist launched a Cyber Attack on the IT Systems? H Think Stock
  • 13. 13 Patient Privacy & Data Security H  $2.4 million (2-year) avg. cost to organization in PHI  45% claim >5 breaches (up from 29% in 2010)  2,769 stolen records/breach  75% don’t secure medical devices contain patient data  94% have leaked data
  • 14. 14 WHICH PATIENT DATA BREACH IS WORSE? H  Class-Action lawsuit Glen Falls Hospital NY  Class-Action lawsuit 22 Florida Hospitals  Wyoming Doctor’s personal email exposes 2,900 patient records  Oregon H&SU hacked twice in same year  2 Breaches, 2 States, 2 Hospitals, Same Day – Utah & Mississippi
  • 15. 15 CAN WE SECURE DATA? email ePhish training won’t work Think Stock
  • 16. 16 SEPARATION OF EMAIL & STATE EMAIL SERVER Off-Premise Cloud Corporate IT Network (on-premise) External Communication FIREWALL Few Employees have email Is this the New Paradigm?
  • 17. 17 NEW CHALLENGE OF BYOD Off-Premise Cloud DB1 DB3 DB2 - Remote locations - Multiple devices - How do we Secure? Think Stock

Notas del editor

  1. World’s Fair 1964 to 2013 . . . Half a century, how things have changed.
  2. Sending the cover sheet of a monthly pay requisition.
  3. *Note:Internet World Stats, Net Valley Stats, FactMonster.com
  4. Death by PowerPoint or Death by Email