cyber attack infographic - microsoft · infographic. title: cyber attack infographic created date:...

1
average annual cost of cybercrime facing businesses Number of records stolen The Cyber Security Council's 5 most effective solutions for dealing with cyber threat: Reduce number of users with administrative privileges Patch system and application software within 48 hours Patch system software within within 48 hours Use of standard, secure system configurations Application whitelisting App control is the # 1 strategy for overcoming real world attacks (Australian DoD) Password protection Antivirus software 90 % of passwords are vulnerable to hacking Top 5 common passwords of 2013 92 % of organizations say up to date antivirus software is in use today... ... yet only 34 % rate it as highly effective in preventing cyber intrusions Firewalls 88 % say a perimeter firewall is in use today... ...the remaining 12 % have plans to implement one 34 % of an organization’s total time on IT security issues is dedicated to managing user profiles ... 92 % of critical Microsoft vulnerabilities would be mitigated by removing admin rights 100 % of Internet Explorer vulnerabilities would be mitigated by removing admin rights. @ Phishing 53 % Rogue software /downloads 60 % Target Unpatched vulnerabilities 74 % Targeted attacks (APTs) 77 % $7m = of companies are either not prepared or only minimally prepared to deal with attacks 52 % Yet is dedicated to securing the endpoint... 48 % ...while say that securing the endpoint is difficult to achieve 81 % ...yet increase in the number of data breaches in 2013 62 % There was a Over 288,000 new cyber threats are reported every day that’s 3 per second US Military Veterans LivingSocial Adobe 110 Million 70 Million 50 Million 38 Million Man in the middle attacks 38 % + + -- = $ 7 , 000 , 000 1. 123456 2. password 3. 12345678 4. qwerty 5. abc123 UPDATE 0 1 EASY 1 0 0 1 0 1 0 1 0 0 1 0 1 1 0 0 0 0 1 1 0 1 0 1 1 0 0 6th of never 1 0 1 0 1 0 0 1 0 1 1 0 0 0 0 1 0 1 1 0 0 0 0 1 1 0 1 0 1 1 0 0 1 0 1 0 1 0 0 1 0 1 1 0 0 0 0 1 0 1 1 0 0 0 0 1 1 0 1 0 1 1 0 0 1 0 1 0 1 0 0 1 1 0 0 0 0 1 1 0 0 0 1 0 1 0 1 1 1 0 1 0 1 0 0 1 1 0 0 0 0 1 1 0 0 0 1 0 1 0 1 1 1 0 1 0 1 0 0 1 0 1 1 0 0 0 0 1 1 0 1 0 1 0 0 1 1 0 0 0 A Are businesses today doing enough to succeed in the battle against cyber security threats and are the traditional methods they are using the most effective? Overcoming Cyber Attacks Avecto @avecto Avecto avecto.com [email protected] Sources Infosec Security Survey: conducted by Avecto at InfoSec 2014. The Internet Society: http://www.internetsociety.org/history?gclid=CLyb45al-b0CFcHn wgodhIMAxwhttp: //www.personal.psu.edu/users/j/m/jms6423/Engproj/History%20of%20Computer%20Crime.xhtml Computer Hope: http://www.computerhope.com/history/internet.htm Heartbleed.com: http://heartbleed.com/ Microsoft: http://research.microsoft.com/en-us/um/people/mbj/Smiley/smiley.html About.com: http://email.about.com/od/emailtrivia/f/first_spam.htm Internet World Stats: http://www.internetworldstats.com/emarketing.htm LiveScience: http://www.livescience.com/20727-internet-history.html Wikipedia: http://en.wikipedia.org/wiki/Timeline_of_computer_viruses_and_worms http://www.nytimes.com/2014/02/09/us/snowden-used-low-cost-tool-to-best-nsa.html?hp&_r=2 Pew Research Internet Project: http://www.pewinternet.org/2014/03/11/world-wide-web-timeline/ UK Hobart House Cheadle Royal Business Park Cheadle, Cheshire, SK8 3SR Phone +44 (0)845 519 0114 Fax +44 (0)845 519 0115 Americas 125 Cambridge Park Drive Suite 301, Cambridge, MA 02140, USA Phone 978 703 4169 Fax 978 910 0448 Australia Level 8 350 Collins Street, Melbourne, Victoria 3000, Australia Phone +613 8605 4822 Fax +613 8601 1180 Are you protected? Cyber challenges facing today’s businesses Major real life data breaches in 2013/14 Effectiveness of traditional security solutions Proactive defense in depth Security Infographic

Upload: others

Post on 25-Jul-2020

7 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Cyber attack infographic - Microsoft · Infographic. Title: Cyber attack infographic Created Date: 10/23/2014 1:08:47 PM

average annual cost of cybercrime facing

businesses

Number of records stolen

The Cyber Security Council's 5 most effective solutions for dealing with cyber threat:

Reduce number of users with

administrative privileges

Patch system and application software within 48 hours

Patch system software within

within 48 hours

Use of standard, secure system configurations

Application whitelisting

App control is the #1 strategy forovercoming real world attacks (Australian DoD)

Password protection Antivirus software

90%of passwords are

vulnerable to hacking

Top 5 common passwords of 2013

92% of organizations say up to date antivirus

software is in use today...

... yet only 34% rate it as highly effective in preventing cyber intrusions

Firewalls

88% say a perimeter firewall is in use today...

...the remaining 12%have plans to implement one

34% of an organization’s total time on IT security issues is dedicated to managing user profiles ...

92% of critical Microsoft vulnerabilities

would be mitigated by removing admin rights

100% of Internet Explorer vulnerabilities would be mitigated by removing admin rights.

@

Phishing

53%

Rogue software /downloads

60%

Target

Unpatched vulnerabilities

74%

Targeted attacks (APTs)

77%

$7m=of companies are either

not prepared or only minimally prepared to

deal with attacks

52%Yet

is dedicated to securing the endpoint...

48%...whilesay that securing the endpoint is difficult

to achieve

81%...yet

increase in the number of data breaches in 2013

62%There was a Over 288,000 new cyber threats are

reported every day

– that’s 3 persecond

US Military Veterans LivingSocial Adobe

110Million

70Million

50Million

38Million

Man in themiddle attacks

38%

++- - =$7,000,000

1 . 1 2 3 4 5 6 2 . p a s s w o r d3 . 1 2 3 4 5 6 7 84 . q w e r t y5 . a b c 1 2 3

UPDATE0 1 E A S Y 1 0 01 0 1 0 1 0 0 1

0 1 1 0 0 0 0 11 0 1 0 1 1 0 0

6thof never

1 0 1 0 1 0 0 1

0 1 1 0 0 0 0 1

0 1 1 0 0 0 0 11 0 1 0 1 1 0 0

1 0 1 0 1 0 0 1

0 1 1 0 0 0 0 1

0 1 1 0 0 0 0 11 0 1 0 1 1 0 0

1 0 1 0 1 0 0 1

0 1 1 0 0 0 0 1

0 1 1 0 0 0 0 11 0 1 0 1 1 0 0

1 0 1 0 1 0 0 1

0 1 1 0 0 0 0 1

0 1 1 0 0 0 0 11 0 1 0 1 1 0 0

1 0 1 0 1 0 0 10 1 1 0 0 0 0 1

1 0 1 0 1 0 0 10 1 1 0 0 0 0 1

A

Are businesses today doing enough to succeed in the battle against cyber security threats and are the traditional methods they are using the most effective?

OvercomingCyber Attacks

Avecto@avectoAvecto

[email protected]

SourcesInfosec Security Survey: conducted by Avecto at InfoSec 2014. The Internet Society: http://www.internetsociety.org/history?gclid=CLyb45al-b0CFcHnwgodhIMAxwhttp: //www.personal.psu.edu/users/j/m/jms6423/Engproj/History%20of%20Computer%20Crime.xhtmlComputer Hope: http://www.computerhope.com/history/internet.htmHeartbleed.com: http://heartbleed.com/Microsoft: http://research.microsoft.com/en-us/um/people/mbj/Smiley/smiley.htmlAbout.com: http://email.about.com/od/emailtrivia/f/first_spam.htmInternet World Stats: http://www.internetworldstats.com/emarketing.htmLiveScience: http://www.livescience.com/20727-internet-history.htmlWikipedia: http://en.wikipedia.org/wiki/Timeline_of_computer_viruses_and_wormshttp://www.nytimes.com/2014/02/09/us/snowden-used-low-cost-tool-to-best-nsa.html?hp&_r=2Pew Research Internet Project: http://www.pewinternet.org/2014/03/11/world-wide-web-timeline/

UKHobart HouseCheadle Royal Business ParkCheadle, Cheshire, SK8 3SR

Phone +44 (0)845 519 0114Fax +44 (0)845 519 0115

Americas125 Cambridge Park DriveSuite 301, Cambridge, MA 02140, USA

Phone 978 703 4169Fax 978 910 0448

AustraliaLevel 8350 Collins Street, Melbourne, Victoria 3000, Australia

Phone +613 8605 4822Fax +613 8601 1180

Are you protected?

Cyber challenges facing today’s businesses

Major real life data breaches in 2013/14

Effectiveness of traditional security solutions

Proactive defense in depth

Security

Infographic