SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
ThreebillionITsecurityattacks
WHYCARE?
EVOLVING
Securitythreatsare
movingfast
BIG AND ORGANISED
Thethreatishuge,crossing
geographyandnational
boundaries
EVERYONEISDIGITAL
RiskisnotjustanITproblem,
it’saproblem forany
organisationthatusesIT
NTT’sbreadthandscopeallowedittoanalysethreebillionITsecurityattacksin2013
CyberSecurity
inGlobalBusiness
Threatrisk
identifiedas
#3
Morethan
Threats
new
malware
51,000
Mobile
ofcritical
havingbeenaffectedbycyber
attacks.
infrastructureprovidersreport
80%
95%
oflossescouldbereduced
byfocusedinvestment
Wearealltargets
AttacksbyIndustry
20
15
10
5
0
Education
Energy&
Utilities
Finance
Gaming/
Entertainment
Government
Healthcare
Hospitality
Manufacturing
Non-Profit
RetailTechnology
Transportation
Business
Services
Construction
/RealEstate
12%
1% 1% 1%
0%
5% 6%
19%
6%
13%
14%
3%
10% 10%
KindsofAttacks
Theincreasingtargetsofattacksareapplications… andtheindividualsusingthem.
AttacksbyCategory
34%
15%
10%
8%
8%
6%
5%
5%
9%
ClientBotnetActivity
Suspicious
NetworkManipulation
ServiceSpecificAttack
WebApplicationAttack
ApplicationSpecificAttack
DoS/DDoS
Reconnaissance
Others
Findings
Basicsecuritymeasuresarerequired,not
optional.#1CounterMeasure
tothechangingTHREATS
77% oftheorganisations
involvedhadnoincidentresponse
team,policiesorproceduresinplace
71% ofnew
malwaregoesundetected
whenanalysedinasandbox
Performing
Regular
Vulnerabilityscanssignificantly
reducesyourRisk
Over50% ofvulnerabilitieswerealready
knownsomedatingbackto2004
Riskisshapeddynamically.
Securitythreatsareincreasinglycomplex.Wemust
moderniseourthinking.Thenew perimeterisME.
MissingBasic
Controls
43% ofincidentresponse
engagementsweretheresultof
malware.
NoResponsePlan
increasescosts
Mostofthecostsassociatedwith
respondingtoincidentsaredueto
inadequateplanning,missingbasiccontrols
andlackofformaltraining.
x
x
x
x
x
x
x
x
Modernattacksmustbedefended
in-depthwithnetworkmalware
detectionandpurpose-built
solutions.
Defencein
Depth
Whatcanyoudo?
Addressthe
eroding
perimeter
Useeffective
patch
management
1 3
2 4Defineand
testincident
response
Takeadvantage
ofnew
technologiesand
techniques
WhoisNTT?
Networkcoverage
in160countries
Directpresence
in72countries
243data
centres
Over220thousand
employees
Sources:
GlobalThreatIntelligenceReport-NTTGroup
kindex
NQ Mobile’s2013MidyearMobileSecurityReport
2012McKinsey&Co.“Cyber-safe:Keyelementstopreventand
respondtosecuritythreats”
www.nttict.com

Más contenido relacionado

La actualidad más candente

CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 

La actualidad más candente (20)

Meeting consumer needs, now and in the future - Digital Futures 2025
Meeting consumer needs, now and in the future - Digital Futures 2025Meeting consumer needs, now and in the future - Digital Futures 2025
Meeting consumer needs, now and in the future - Digital Futures 2025
 
Infographic on Smartphone Revolution
Infographic on Smartphone RevolutionInfographic on Smartphone Revolution
Infographic on Smartphone Revolution
 
Presentasi ltn nu
Presentasi ltn nuPresentasi ltn nu
Presentasi ltn nu
 
10 Top Newsworthy Tech Industry Headlines Of 2020 | Other Than COVID
10 Top Newsworthy Tech Industry Headlines Of 2020 | Other Than COVID10 Top Newsworthy Tech Industry Headlines Of 2020 | Other Than COVID
10 Top Newsworthy Tech Industry Headlines Of 2020 | Other Than COVID
 
Sustainability, Best's Review, December 2018
Sustainability, Best's Review, December 2018Sustainability, Best's Review, December 2018
Sustainability, Best's Review, December 2018
 
CES 2015 - Social Media Trends
CES 2015 - Social Media TrendsCES 2015 - Social Media Trends
CES 2015 - Social Media Trends
 
Telecom market growth awaits 5 g launch
Telecom market growth awaits 5 g launchTelecom market growth awaits 5 g launch
Telecom market growth awaits 5 g launch
 
IQ Telecom - Spotlight On Mobile Trends
IQ Telecom - Spotlight On Mobile TrendsIQ Telecom - Spotlight On Mobile Trends
IQ Telecom - Spotlight On Mobile Trends
 
Information technology
Information technologyInformation technology
Information technology
 
5G Infrastructure Investments
5G Infrastructure Investments5G Infrastructure Investments
5G Infrastructure Investments
 
ADAB OF DIGITAL AWARENESS
ADAB OF DIGITAL AWARENESSADAB OF DIGITAL AWARENESS
ADAB OF DIGITAL AWARENESS
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Applause case study
Applause case study Applause case study
Applause case study
 
E-Commerce In India
E-Commerce In IndiaE-Commerce In India
E-Commerce In India
 
Data Con LA 2018 Keynote - The secret to your big data success by Tim Eusterman
Data Con LA 2018 Keynote - The secret to your big data success by Tim EustermanData Con LA 2018 Keynote - The secret to your big data success by Tim Eusterman
Data Con LA 2018 Keynote - The secret to your big data success by Tim Eusterman
 
Digital Trend Study 2019 - "How to Survive in Digital 2019" - Teaser
Digital Trend Study 2019 - "How to Survive in Digital 2019" - TeaserDigital Trend Study 2019 - "How to Survive in Digital 2019" - Teaser
Digital Trend Study 2019 - "How to Survive in Digital 2019" - Teaser
 
Presentación Alessander Firmino - eCommerce Day Bogotá 2015
Presentación Alessander Firmino - eCommerce Day Bogotá 2015 Presentación Alessander Firmino - eCommerce Day Bogotá 2015
Presentación Alessander Firmino - eCommerce Day Bogotá 2015
 
Ready or Not: The Next Dialtone
Ready or Not: The Next DialtoneReady or Not: The Next Dialtone
Ready or Not: The Next Dialtone
 
SEMPL 19: SNEHA NAGESH, Global Search Business Director, PHD Global Business UK
SEMPL 19: SNEHA NAGESH, Global Search Business Director, PHD Global Business UKSEMPL 19: SNEHA NAGESH, Global Search Business Director, PHD Global Business UK
SEMPL 19: SNEHA NAGESH, Global Search Business Director, PHD Global Business UK
 
Innovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart SecurityInnovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart Security
 

Destacado

Presentazione forum pa challenge 1
Presentazione forum pa challenge 1Presentazione forum pa challenge 1
Presentazione forum pa challenge 1
Carlo Sciuto
 

Destacado (15)

St Edmund's College prepares it's students for the future with NTT Communicat...
St Edmund's College prepares it's students for the future with NTT Communicat...St Edmund's College prepares it's students for the future with NTT Communicat...
St Edmund's College prepares it's students for the future with NTT Communicat...
 
Cooking on board a yacht
Cooking on board a yachtCooking on board a yacht
Cooking on board a yacht
 
Retro Responsive: From Fixed-Width to Flexible in 55 Minutes
Retro Responsive: From Fixed-Width to Flexible in 55 MinutesRetro Responsive: From Fixed-Width to Flexible in 55 Minutes
Retro Responsive: From Fixed-Width to Flexible in 55 Minutes
 
3
33
3
 
Omanvaa mobile app
Omanvaa mobile appOmanvaa mobile app
Omanvaa mobile app
 
InnoYouth kursus om innovation i AT (Almen Studieforberedelse) på Maribo Gymn...
InnoYouth kursus om innovation i AT (Almen Studieforberedelse) på Maribo Gymn...InnoYouth kursus om innovation i AT (Almen Studieforberedelse) på Maribo Gymn...
InnoYouth kursus om innovation i AT (Almen Studieforberedelse) på Maribo Gymn...
 
أمريكا وروسيا ورعاية الطرق الصوفية
 أمريكا وروسيا ورعاية الطرق الصوفية أمريكا وروسيا ورعاية الطرق الصوفية
أمريكا وروسيا ورعاية الطرق الصوفية
 
Presentazione forum pa challenge 1
Presentazione forum pa challenge 1Presentazione forum pa challenge 1
Presentazione forum pa challenge 1
 
الأمة والحاكم
الأمة والحاكمالأمة والحاكم
الأمة والحاكم
 
Content as strategy: creating value throughout the consumer’s journey
Content as strategy: creating value throughout the consumer’s journeyContent as strategy: creating value throughout the consumer’s journey
Content as strategy: creating value throughout the consumer’s journey
 
10 reasons to do a Langkawi yacht charter
10 reasons to do a Langkawi yacht charter10 reasons to do a Langkawi yacht charter
10 reasons to do a Langkawi yacht charter
 
LSN Lead System Network Presentation 100% Commisions
LSN Lead System Network Presentation 100% CommisionsLSN Lead System Network Presentation 100% Commisions
LSN Lead System Network Presentation 100% Commisions
 
Outline of maiden speech
Outline of maiden speechOutline of maiden speech
Outline of maiden speech
 
Content in customer's journey
Content in customer's journeyContent in customer's journey
Content in customer's journey
 
Create new kinds of multiuser experiences using hydna and Unity
Create new kinds of multiuser experiences using hydna and UnityCreate new kinds of multiuser experiences using hydna and Unity
Create new kinds of multiuser experiences using hydna and Unity
 

Similar a Security Threats in IT Infographic

What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
CR Group
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
Henry Worth
 
Coronavirus Impact Assessment And Mitigation Strategies In ICT Industry Compl...
Coronavirus Impact Assessment And Mitigation Strategies In ICT Industry Compl...Coronavirus Impact Assessment And Mitigation Strategies In ICT Industry Compl...
Coronavirus Impact Assessment And Mitigation Strategies In ICT Industry Compl...
SlideTeam
 

Similar a Security Threats in IT Infographic (20)

Deception Technology Market – Overview of advancements in innovation 2025
Deception Technology Market – Overview of advancements in innovation 2025Deception Technology Market – Overview of advancements in innovation 2025
Deception Technology Market – Overview of advancements in innovation 2025
 
Cyberattacks on the Rise Infographic
Cyberattacks on the Rise InfographicCyberattacks on the Rise Infographic
Cyberattacks on the Rise Infographic
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
Digital Transformation & Cloud Profitability
Digital Transformation & Cloud ProfitabilityDigital Transformation & Cloud Profitability
Digital Transformation & Cloud Profitability
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Security transformation: Helping you manage digital risk
Security transformation: Helping you manage digital riskSecurity transformation: Helping you manage digital risk
Security transformation: Helping you manage digital risk
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
 
Cyber Security Threats
Cyber Security Threats Cyber Security Threats
Cyber Security Threats
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
Coronavirus Impact Assessment And Mitigation Strategies In ICT Industry Compl...
Coronavirus Impact Assessment And Mitigation Strategies In ICT Industry Compl...Coronavirus Impact Assessment And Mitigation Strategies In ICT Industry Compl...
Coronavirus Impact Assessment And Mitigation Strategies In ICT Industry Compl...
 
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 ReportNinth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 

Último

一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 

Último (20)

Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 

Security Threats in IT Infographic

  • 1. ThreebillionITsecurityattacks WHYCARE? EVOLVING Securitythreatsare movingfast BIG AND ORGANISED Thethreatishuge,crossing geographyandnational boundaries EVERYONEISDIGITAL RiskisnotjustanITproblem, it’saproblem forany organisationthatusesIT NTT’sbreadthandscopeallowedittoanalysethreebillionITsecurityattacksin2013 CyberSecurity inGlobalBusiness Threatrisk identifiedas #3 Morethan Threats new malware 51,000 Mobile ofcritical havingbeenaffectedbycyber attacks. infrastructureprovidersreport 80% 95% oflossescouldbereduced byfocusedinvestment Wearealltargets AttacksbyIndustry 20 15 10 5 0 Education Energy& Utilities Finance Gaming/ Entertainment Government Healthcare Hospitality Manufacturing Non-Profit RetailTechnology Transportation Business Services Construction /RealEstate 12% 1% 1% 1% 0% 5% 6% 19% 6% 13% 14% 3% 10% 10% KindsofAttacks Theincreasingtargetsofattacksareapplications… andtheindividualsusingthem. AttacksbyCategory 34% 15% 10% 8% 8% 6% 5% 5% 9% ClientBotnetActivity Suspicious NetworkManipulation ServiceSpecificAttack WebApplicationAttack ApplicationSpecificAttack DoS/DDoS Reconnaissance Others Findings Basicsecuritymeasuresarerequired,not optional.#1CounterMeasure tothechangingTHREATS 77% oftheorganisations involvedhadnoincidentresponse team,policiesorproceduresinplace 71% ofnew malwaregoesundetected whenanalysedinasandbox Performing Regular Vulnerabilityscanssignificantly reducesyourRisk Over50% ofvulnerabilitieswerealready knownsomedatingbackto2004 Riskisshapeddynamically. Securitythreatsareincreasinglycomplex.Wemust moderniseourthinking.Thenew perimeterisME. MissingBasic Controls 43% ofincidentresponse engagementsweretheresultof malware. NoResponsePlan increasescosts Mostofthecostsassociatedwith respondingtoincidentsaredueto inadequateplanning,missingbasiccontrols andlackofformaltraining. x x x x x x x x Modernattacksmustbedefended in-depthwithnetworkmalware detectionandpurpose-built solutions. Defencein Depth Whatcanyoudo? Addressthe eroding perimeter Useeffective patch management 1 3 2 4Defineand testincident response Takeadvantage ofnew technologiesand techniques WhoisNTT? Networkcoverage in160countries Directpresence in72countries 243data centres Over220thousand employees Sources: GlobalThreatIntelligenceReport-NTTGroup kindex NQ Mobile’s2013MidyearMobileSecurityReport 2012McKinsey&Co.“Cyber-safe:Keyelementstopreventand respondtosecuritythreats” www.nttict.com