SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
KEEP YOUR BUSINESS DATA SAFE
ESCAPE THE NOTICE OF
CYBER-CRIMINALS
A perfect IT security storm
is brewing for businesses.
Tech trends like mobility, cloud computing,
social media and the Internet of Things
have transformed how we work
and exposed our personal and
business data like never before.
Tech trends like mobility, cloud computing,
social media and the Internet of Things
have transformed how we work
At the same time, the
cybercrime industry has
radically transformed.
Hacking
‘just for fun’
has evolved into carefully
planned cyber-attacks for
profit or political gain.
At the same time, the
cybercrime industry has
radically transformed.
corporations,
hacktivists,
cyber-terrorists,
The threat comes
in many forms,
from anywhere:
Source: ENISA Threat Landscape 2013: Overview of current and emerging cyber-threats
even your own
employees.
corporations,
hacktivists,
cyber-terrorists,
The threat comes
in many forms,
from anywhere:
Poor security practices
have left many companies
wide open to attack.
Where are organisations most vulnerable?
? ? ? ? ?
Where are organisations most vulnerable?
MOBILE
COMPUTING
SOCIAL
MEDIA
CLOUD
COMPUTING
CARELESS
EMPLOYEES
OUTDATED
SECURITY
CONTROLS
Source: Under Cyber Attack: EY’s Global Information Security Survey 2013
On average, a single data breach costs
European businesses US$3.2 million,
with 23,647 records compromised
per breach.
Source: 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute Research Report
Source: 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute Research Report
Germany US$4.82 million
France US$3.76 million
UK US$3.14 million
On average, a single data breach costs
European businesses US$3.2 million,
with 23,647 records compromised
per breach.
For some countries
the cost is even higher:
Cyber-threats
can also cost you
customers, damage
your reputation and
competitive edge.
CO
MPETITIVE
CU
STOMERS
E
DGE
R
EPUTATION
Yet only a quarter
of businesses have a
formal IT security plan
and many are struggling
to set up basic security
fundamentals.
A lack of knowledge,
skills and resources
means organisations
are unprepared
and vulnerable.
A lack of knowledge,
skills and resources
means organisations
are unprepared
and vulnerable.
Are you?
AMID THIS RAPIDLY
HOW CAN YOU SAFELY
CHANGING ENVIRONMENT
NAVIGATE THE THREAT?
Develop a flexible business-
wide strategy that aligns
security priorities with
business objectives.
BE
STRATEGIC
Conduct a thorough
security and risk
assessment.
BENCHMARK
YOUR BUSINESS
Make data security your
primary focus so you can
respond to incidents fast.
PRIORITISE
DATA SECURITY
Embrace basic security
measures. Eliminate
platforms like Java where
possible, keep patches up
to date and use a password
manager to set strong
passwords.
FIGHT FIRE
WITH FIRE
Today’s sophisticated
cyber-threats require
a smarter approach
to security.
WHAT ARE YOU
GOING TO DO
ABOUT IT?
Download our
FREE guide to
cyber security.
GET THE TOOLS
YOUR BUSINESS SAFE.
YOU NEED TO KEEP

Mais conteúdo relacionado

Destaque

Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network DefendersHack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network DefendersLife Cycle Engineering
 
SECQME Watch Over Me Deck 2014
SECQME Watch Over Me Deck 2014SECQME Watch Over Me Deck 2014
SECQME Watch Over Me Deck 2014Khoo Shiang
 
Big data and cyber security legal risks and challenges
Big data and cyber security legal risks and challengesBig data and cyber security legal risks and challenges
Big data and cyber security legal risks and challengesKapil Mehrotra
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting Sina Manavi
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testingSanthosh Kumar
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?CyberSafeFamily
 
Growth Hacking with Data: How to Find Big Growth with Deep Data Dives
Growth Hacking with Data: How to Find Big Growth with Deep Data DivesGrowth Hacking with Data: How to Find Big Growth with Deep Data Dives
Growth Hacking with Data: How to Find Big Growth with Deep Data DivesSean Ellis
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCanSecWest
 

Destaque (18)

Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network DefendersHack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
 
SECQME Watch Over Me Deck 2014
SECQME Watch Over Me Deck 2014SECQME Watch Over Me Deck 2014
SECQME Watch Over Me Deck 2014
 
Big data and cyber security legal risks and challenges
Big data and cyber security legal risks and challengesBig data and cyber security legal risks and challenges
Big data and cyber security legal risks and challenges
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testing
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?
 
Growth Hacking with Data: How to Find Big Growth with Deep Data Dives
Growth Hacking with Data: How to Find Big Growth with Deep Data DivesGrowth Hacking with Data: How to Find Big Growth with Deep Data Dives
Growth Hacking with Data: How to Find Big Growth with Deep Data Dives
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
 

Último

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Escape the notice of cyber-criminals! Keep your business data safe

  • 1. KEEP YOUR BUSINESS DATA SAFE ESCAPE THE NOTICE OF CYBER-CRIMINALS
  • 2. A perfect IT security storm is brewing for businesses.
  • 3. Tech trends like mobility, cloud computing, social media and the Internet of Things have transformed how we work
  • 4. and exposed our personal and business data like never before. Tech trends like mobility, cloud computing, social media and the Internet of Things have transformed how we work
  • 5. At the same time, the cybercrime industry has radically transformed.
  • 6. Hacking ‘just for fun’ has evolved into carefully planned cyber-attacks for profit or political gain. At the same time, the cybercrime industry has radically transformed.
  • 8. Source: ENISA Threat Landscape 2013: Overview of current and emerging cyber-threats even your own employees. corporations, hacktivists, cyber-terrorists, The threat comes in many forms, from anywhere:
  • 9. Poor security practices have left many companies wide open to attack.
  • 10. Where are organisations most vulnerable? ? ? ? ? ?
  • 11. Where are organisations most vulnerable? MOBILE COMPUTING SOCIAL MEDIA CLOUD COMPUTING CARELESS EMPLOYEES OUTDATED SECURITY CONTROLS Source: Under Cyber Attack: EY’s Global Information Security Survey 2013
  • 12. On average, a single data breach costs European businesses US$3.2 million, with 23,647 records compromised per breach. Source: 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute Research Report
  • 13. Source: 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute Research Report Germany US$4.82 million France US$3.76 million UK US$3.14 million On average, a single data breach costs European businesses US$3.2 million, with 23,647 records compromised per breach. For some countries the cost is even higher:
  • 14. Cyber-threats can also cost you customers, damage your reputation and competitive edge. CO MPETITIVE CU STOMERS E DGE R EPUTATION
  • 15. Yet only a quarter of businesses have a formal IT security plan
  • 16. and many are struggling to set up basic security fundamentals.
  • 17. A lack of knowledge, skills and resources means organisations are unprepared and vulnerable.
  • 18. A lack of knowledge, skills and resources means organisations are unprepared and vulnerable. Are you?
  • 19. AMID THIS RAPIDLY HOW CAN YOU SAFELY CHANGING ENVIRONMENT NAVIGATE THE THREAT?
  • 20. Develop a flexible business- wide strategy that aligns security priorities with business objectives. BE STRATEGIC
  • 21. Conduct a thorough security and risk assessment. BENCHMARK YOUR BUSINESS
  • 22. Make data security your primary focus so you can respond to incidents fast. PRIORITISE DATA SECURITY
  • 23. Embrace basic security measures. Eliminate platforms like Java where possible, keep patches up to date and use a password manager to set strong passwords. FIGHT FIRE WITH FIRE
  • 24. Today’s sophisticated cyber-threats require a smarter approach to security.
  • 25. WHAT ARE YOU GOING TO DO ABOUT IT?
  • 26. Download our FREE guide to cyber security. GET THE TOOLS YOUR BUSINESS SAFE. YOU NEED TO KEEP