cyber attack infographic - microsoft · infographic. title: cyber attack infographic created date:...

Post on 25-Jul-2020

7 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

average annual cost of cybercrime facing

businesses

Number of records stolen

The Cyber Security Council's 5 most effective solutions for dealing with cyber threat:

Reduce number of users with

administrative privileges

Patch system and application software within 48 hours

Patch system software within

within 48 hours

Use of standard, secure system configurations

Application whitelisting

App control is the #1 strategy forovercoming real world attacks (Australian DoD)

Password protection Antivirus software

90%of passwords are

vulnerable to hacking

Top 5 common passwords of 2013

92% of organizations say up to date antivirus

software is in use today...

... yet only 34% rate it as highly effective in preventing cyber intrusions

Firewalls

88% say a perimeter firewall is in use today...

...the remaining 12%have plans to implement one

34% of an organization’s total time on IT security issues is dedicated to managing user profiles ...

92% of critical Microsoft vulnerabilities

would be mitigated by removing admin rights

100% of Internet Explorer vulnerabilities would be mitigated by removing admin rights.

@

Phishing

53%

Rogue software /downloads

60%

Target

Unpatched vulnerabilities

74%

Targeted attacks (APTs)

77%

$7m=of companies are either

not prepared or only minimally prepared to

deal with attacks

52%Yet

is dedicated to securing the endpoint...

48%...whilesay that securing the endpoint is difficult

to achieve

81%...yet

increase in the number of data breaches in 2013

62%There was a Over 288,000 new cyber threats are

reported every day

– that’s 3 persecond

US Military Veterans LivingSocial Adobe

110Million

70Million

50Million

38Million

Man in themiddle attacks

38%

++- - =$7,000,000

1 . 1 2 3 4 5 6 2 . p a s s w o r d3 . 1 2 3 4 5 6 7 84 . q w e r t y5 . a b c 1 2 3

UPDATE0 1 E A S Y 1 0 01 0 1 0 1 0 0 1

0 1 1 0 0 0 0 11 0 1 0 1 1 0 0

6thof never

1 0 1 0 1 0 0 1

0 1 1 0 0 0 0 1

0 1 1 0 0 0 0 11 0 1 0 1 1 0 0

1 0 1 0 1 0 0 1

0 1 1 0 0 0 0 1

0 1 1 0 0 0 0 11 0 1 0 1 1 0 0

1 0 1 0 1 0 0 1

0 1 1 0 0 0 0 1

0 1 1 0 0 0 0 11 0 1 0 1 1 0 0

1 0 1 0 1 0 0 1

0 1 1 0 0 0 0 1

0 1 1 0 0 0 0 11 0 1 0 1 1 0 0

1 0 1 0 1 0 0 10 1 1 0 0 0 0 1

1 0 1 0 1 0 0 10 1 1 0 0 0 0 1

A

Are businesses today doing enough to succeed in the battle against cyber security threats and are the traditional methods they are using the most effective?

OvercomingCyber Attacks

Avecto@avectoAvecto

avecto.cominfo@avecto.com

SourcesInfosec Security Survey: conducted by Avecto at InfoSec 2014. The Internet Society: http://www.internetsociety.org/history?gclid=CLyb45al-b0CFcHnwgodhIMAxwhttp: //www.personal.psu.edu/users/j/m/jms6423/Engproj/History%20of%20Computer%20Crime.xhtmlComputer Hope: http://www.computerhope.com/history/internet.htmHeartbleed.com: http://heartbleed.com/Microsoft: http://research.microsoft.com/en-us/um/people/mbj/Smiley/smiley.htmlAbout.com: http://email.about.com/od/emailtrivia/f/first_spam.htmInternet World Stats: http://www.internetworldstats.com/emarketing.htmLiveScience: http://www.livescience.com/20727-internet-history.htmlWikipedia: http://en.wikipedia.org/wiki/Timeline_of_computer_viruses_and_wormshttp://www.nytimes.com/2014/02/09/us/snowden-used-low-cost-tool-to-best-nsa.html?hp&_r=2Pew Research Internet Project: http://www.pewinternet.org/2014/03/11/world-wide-web-timeline/

UKHobart HouseCheadle Royal Business ParkCheadle, Cheshire, SK8 3SR

Phone +44 (0)845 519 0114Fax +44 (0)845 519 0115

Americas125 Cambridge Park DriveSuite 301, Cambridge, MA 02140, USA

Phone 978 703 4169Fax 978 910 0448

AustraliaLevel 8350 Collins Street, Melbourne, Victoria 3000, Australia

Phone +613 8605 4822Fax +613 8601 1180

Are you protected?

Cyber challenges facing today’s businesses

Major real life data breaches in 2013/14

Effectiveness of traditional security solutions

Proactive defense in depth

Security

Infographic

top related