1
#ACTB4URHACKD A PROTEUS TECHNOLOGIES CYBER SOLUTION CyberVigilance Sources: CSID, Symantic, Nationwide, Heartbleed.com, Zurich Group Survey, CFO Magazine Survey, Chronology of Data Breaches RESEARCH RESPOND REMEDIATE The Solutions The Results (Bulleted Points) (armed Response) Strengthen YOUR security posture with, network security, firewall hardening, strong authentication, encryption and application security measures Implement tools to capture pertinent security activity from within and outside YOUR infrastructure and review logs for irregularities frequently EDUCATE EMPLOYEES Provide guidance to YOUR employees on how to protect sensitive data on personal and corporate devices KNOW THE DATA Understand where YOUR sensitive data resides & where it is flowing to identify the best protection strategy IMPLEMENT STRONG SECURITY BE CYBER VIGILANT of SMBs FAIL within 6 months of a cyber-attack 60% $8,653 Estimated reputational damage to a SMB 159,806,735 records containing sensitive info were compromised last year proteus-technologies.com/CyberVigilance $32K Average amount Cyber criminals rake in from SMBs per successful attack 89% of breaches & data loss incidents could have been prevented 8 in 10 SMBs don’t have a basic cyber-attack response plan 60% of cyber-attacks targeted businesses with < 250 employees 1 in 5 SMBs have been hit by a cyber-attack The Facts (Targeted statistics) Recent trends have shown that major corporaons are not the only vicms of Cyber Security breaches. Aacks on Small & Medium Businesses (SMBs) are on the rise. ARE EASY TARGETS Small Businesses

CV-SMB-infographic-small

Embed Size (px)

Citation preview

Page 1: CV-SMB-infographic-small

#ACTB4URHACKD

A PROTEUS TECHNOLOGIES CYBER SOLUTION

CyberVigilance™

Sources: CSID, Symantic, Nationwide, Heartbleed.com, Zurich Group Survey, CFO Magazine Survey, Chronology of Data Breaches

RESEARCH RESPONDREMEDIATE

The Solutions

The Results (Bulleted Points)

(armed Response)

Strengthen YOUR security posture with, network security, firewall hardening, strong authentication, encryption and application

security measures

Implement tools to capture pertinent security activity from within and outside YOUR infrastructure and review logs for

irregularities frequently

EDUCATE EMPLOYEESProvide guidance to YOUR employees on

how to protect sensitive data on personal and

corporate devices

KNOW THE DATA

Understand where YOUR sensitive data resides & where it is flowing to identify the

best protection strategy

IMPLEMENT STRONG SECURITY

BE CYBER VIGILANT

of SMBs FAIL within 6 months of a cyber-attack

60%

$8,653Estimated reputational damage to a SMB

159,806,735records containing sensitive info were compromised last year

proteus-technologies.com/CyberVigilance

$32KAverage amount Cyber criminals rake in from SMBs per successful attack

89%of breaches & data loss incidents

could have been prevented

8 in 10SMBs don’t have a basic

cyber-attack response plan

60%of cyber-attacks targeted

businesses with < 250 employees

1 in 5SMBs have been hit by a

cyber-attack

The Facts (Targeted statistics)

Recent trends have shown that major corporations are not the only victims of Cyber Security breaches. Attacks on Small & Medium Businesses (SMBs) are on the rise.

ARE EASY TARGETSSmall Businesses