SlideShare una empresa de Scribd logo
1 de 26
Descargar para leer sin conexión
KEEP YOUR BUSINESS DATA SAFE
ESCAPE THE NOTICE OF
CYBER-CRIMINALS
A perfect IT security storm
is brewing for businesses.
Tech trends like mobility, cloud computing,
social media and the Internet of Things
have transformed how we work
and exposed our personal and
business data like never before.
Tech trends like mobility, cloud computing,
social media and the Internet of Things
have transformed how we work
At the same time, the
cybercrime industry has
radically transformed.
Hacking
‘just for fun’
has evolved into carefully
planned cyber-attacks for
profit or political gain.
At the same time, the
cybercrime industry has
radically transformed.
corporations,
hacktivists,
cyber-terrorists,
The threat comes
in many forms,
from anywhere:
Source: ENISA Threat Landscape 2013: Overview of current and emerging cyber-threats
even your own
employees.
corporations,
hacktivists,
cyber-terrorists,
The threat comes
in many forms,
from anywhere:
Poor security practices
have left many companies
wide open to attack.
Where are organisations most vulnerable?
? ? ? ? ?
Where are organisations most vulnerable?
MOBILE
COMPUTING
SOCIAL
MEDIA
CLOUD
COMPUTING
CARELESS
EMPLOYEES
OUTDATED
SECURITY
CONTROLS
Source: Under Cyber Attack: EY’s Global Information Security Survey 2013
On average, a single data breach costs
European businesses US$3.2 million,
with 23,647 records compromised
per breach.
Source: 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute Research Report
Source: 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute Research Report
Germany US$4.82 million
France US$3.76 million
UK US$3.14 million
On average, a single data breach costs
European businesses US$3.2 million,
with 23,647 records compromised
per breach.
For some countries
the cost is even higher:
Cyber-threats
can also cost you
customers, damage
your reputation and
competitive edge.
CO
MPETITIVE
CU
STOMERS
E
DGE
R
EPUTATION
Yet only a quarter
of businesses have a
formal IT security plan
and many are struggling
to set up basic security
fundamentals.
A lack of knowledge,
skills and resources
means organisations
are unprepared
and vulnerable.
A lack of knowledge,
skills and resources
means organisations
are unprepared
and vulnerable.
Are you?
AMID THIS RAPIDLY
HOW CAN YOU SAFELY
CHANGING ENVIRONMENT
NAVIGATE THE THREAT?
Develop a flexible business-
wide strategy that aligns
security priorities with
business objectives.
BE
STRATEGIC
Conduct a thorough
security and risk
assessment.
BENCHMARK
YOUR BUSINESS
Make data security your
primary focus so you can
respond to incidents fast.
PRIORITISE
DATA SECURITY
Embrace basic security
measures. Eliminate
platforms like Java where
possible, keep patches up
to date and use a password
manager to set strong
passwords.
FIGHT FIRE
WITH FIRE
Today’s sophisticated
cyber-threats require
a smarter approach
to security.
WHAT ARE YOU
GOING TO DO
ABOUT IT?
Download our
FREE guide to
cyber security.
GET THE TOOLS
YOUR BUSINESS SAFE.
YOU NEED TO KEEP

Más contenido relacionado

Destacado

Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network DefendersHack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network DefendersLife Cycle Engineering
 
SECQME Watch Over Me Deck 2014
SECQME Watch Over Me Deck 2014SECQME Watch Over Me Deck 2014
SECQME Watch Over Me Deck 2014Khoo Shiang
 
Big data and cyber security legal risks and challenges
Big data and cyber security legal risks and challengesBig data and cyber security legal risks and challenges
Big data and cyber security legal risks and challengesKapil Mehrotra
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting Sina Manavi
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testingSanthosh Kumar
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?CyberSafeFamily
 
Growth Hacking with Data: How to Find Big Growth with Deep Data Dives
Growth Hacking with Data: How to Find Big Growth with Deep Data DivesGrowth Hacking with Data: How to Find Big Growth with Deep Data Dives
Growth Hacking with Data: How to Find Big Growth with Deep Data DivesSean Ellis
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCanSecWest
 

Destacado (18)

Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network DefendersHack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
 
SECQME Watch Over Me Deck 2014
SECQME Watch Over Me Deck 2014SECQME Watch Over Me Deck 2014
SECQME Watch Over Me Deck 2014
 
Big data and cyber security legal risks and challenges
Big data and cyber security legal risks and challengesBig data and cyber security legal risks and challenges
Big data and cyber security legal risks and challenges
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testing
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?
 
Growth Hacking with Data: How to Find Big Growth with Deep Data Dives
Growth Hacking with Data: How to Find Big Growth with Deep Data DivesGrowth Hacking with Data: How to Find Big Growth with Deep Data Dives
Growth Hacking with Data: How to Find Big Growth with Deep Data Dives
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
 

Último

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Escape the notice of cyber-criminals! Keep your business data safe

  • 1. KEEP YOUR BUSINESS DATA SAFE ESCAPE THE NOTICE OF CYBER-CRIMINALS
  • 2. A perfect IT security storm is brewing for businesses.
  • 3. Tech trends like mobility, cloud computing, social media and the Internet of Things have transformed how we work
  • 4. and exposed our personal and business data like never before. Tech trends like mobility, cloud computing, social media and the Internet of Things have transformed how we work
  • 5. At the same time, the cybercrime industry has radically transformed.
  • 6. Hacking ‘just for fun’ has evolved into carefully planned cyber-attacks for profit or political gain. At the same time, the cybercrime industry has radically transformed.
  • 8. Source: ENISA Threat Landscape 2013: Overview of current and emerging cyber-threats even your own employees. corporations, hacktivists, cyber-terrorists, The threat comes in many forms, from anywhere:
  • 9. Poor security practices have left many companies wide open to attack.
  • 10. Where are organisations most vulnerable? ? ? ? ? ?
  • 11. Where are organisations most vulnerable? MOBILE COMPUTING SOCIAL MEDIA CLOUD COMPUTING CARELESS EMPLOYEES OUTDATED SECURITY CONTROLS Source: Under Cyber Attack: EY’s Global Information Security Survey 2013
  • 12. On average, a single data breach costs European businesses US$3.2 million, with 23,647 records compromised per breach. Source: 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute Research Report
  • 13. Source: 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute Research Report Germany US$4.82 million France US$3.76 million UK US$3.14 million On average, a single data breach costs European businesses US$3.2 million, with 23,647 records compromised per breach. For some countries the cost is even higher:
  • 14. Cyber-threats can also cost you customers, damage your reputation and competitive edge. CO MPETITIVE CU STOMERS E DGE R EPUTATION
  • 15. Yet only a quarter of businesses have a formal IT security plan
  • 16. and many are struggling to set up basic security fundamentals.
  • 17. A lack of knowledge, skills and resources means organisations are unprepared and vulnerable.
  • 18. A lack of knowledge, skills and resources means organisations are unprepared and vulnerable. Are you?
  • 19. AMID THIS RAPIDLY HOW CAN YOU SAFELY CHANGING ENVIRONMENT NAVIGATE THE THREAT?
  • 20. Develop a flexible business- wide strategy that aligns security priorities with business objectives. BE STRATEGIC
  • 21. Conduct a thorough security and risk assessment. BENCHMARK YOUR BUSINESS
  • 22. Make data security your primary focus so you can respond to incidents fast. PRIORITISE DATA SECURITY
  • 23. Embrace basic security measures. Eliminate platforms like Java where possible, keep patches up to date and use a password manager to set strong passwords. FIGHT FIRE WITH FIRE
  • 24. Today’s sophisticated cyber-threats require a smarter approach to security.
  • 25. WHAT ARE YOU GOING TO DO ABOUT IT?
  • 26. Download our FREE guide to cyber security. GET THE TOOLS YOUR BUSINESS SAFE. YOU NEED TO KEEP