1
CYBER ATTACKS: How to Ninja-Proof Your Data They’re crafty, covert, and silent. They have the tools, skills, time, and patience to unleash underground attacks on even the most fortified walls. Last year, these masters of stealth managed to sneak into some of the world’s biggest establishments causing millions of dollars in loss. Cyber attackers, not ninjas. However, the two are remarkably similar. 2014 at a Glance: The Year of the Mega Breach Ninjas of the 21st century increasingly rely on the Internet and advanced technology to carry out their operations. Newsworthy data breaches were hot headlines throughout 2014, also called, “The Year of the Mega Breach.” 48% increase in cyberattacks in 2014 [1] Records Exposed - JP Morgan - Target - Anthem - Ebay - Sony PSN - Home Depot 76,000,000 70,000,000 80,000,000 145,000,000 77,000,000 56,000,000 What Were They After? Some cyber-ninjas were after credit card information for financial fraud. Some were stealing personal identities to sell to the black market. Credit Cards Emails Identities Company Secrets Health Information Personal Photos Tools of Attack Cyber-ninjas are able to use a combination of old tools and new weapons to work their way in and attack your systems. Malware is like a poison, spreading into your infrastructure. Social engineering is an older, but highly effective, way to steal credentials from employees. Botnets are a network of private computers that the attacker infects and then controls without the user’s knowledge. TOP 3 TOOLS: 167% increase in mobile malware across all platforms in 2014 [4] Malware Social Engineering Botnets Who Was Affected? Cyber-ninjas gained access to more than one billion records in 2014 alone with victims from every demographic. In 2014, 1 in 4 Americans were affected by the mega-breaches at large corporations. What is the Cost of Cybercrime? What Can You Do About It? Even security experts agree that no security strategy is 100% effective, but that does not mean organizations are powerless against cyber attackers. Modern cybersecurity is trending away from “Prevention and Mitigation” towards “Detection and Response.” 1.84 million people were affected by medical identity theft. There was a 600% increase in the number of people impacted by data breaches . $12.7 million in company losses $445 billion in national losses 1. Know Your Environment 2. End-User Visibility 3. Know Your Enemies 4. Prioritize Critical Data 5. Understand Your Weaknesses Secure Your Enterprise! Learn more about enterprise security and compliance solutions with Centre Technologies. www.centretechnologies.com Sources: 1. http://www.pwc.com/gx/en/consulting-services/information-security-survey/key-findings.jhtml 2. http://www.forbes.com/sites/moneybuilder/2015/01/13/the-big-data-breaches-of-2014/ 3. http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf 4. http://www.forbes.com/sites/katevinton/2014/06/24/mobile-malware-is-on-the-rise-mcafee-report-reveals/ 5. http://www.consumerreports.org/cro/news/2015/05/70-million-americans-report-stolen-data/index.htm 6. http://www.healthcare-informatics.com/article/medical-identity-theft-affecting-184-million-us-victims-report 7. http://www.forbes.com/sites/gregorymcneal/2014/10/31/california-attorney-general-reports-600-increase-in-number-of -people-impacted-by-data-breaches/ 8. http://www.heritage.org/research/reports/2014/10/cyber-attacks-on-us-companies-in-2014 9. http://www.insurancejournal.com/news/national/2014/06/09/331333.htm 10. http://fortune.com/2015/04/21/rsa-conference-amit-yoran-keynote/ [2] [3] [5] [6] [7] [8] [9] [10]

Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies

Embed Size (px)

Citation preview

Page 1: Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies

CYBER ATTACKS:How to Ninja-Proof Your Data

They’re crafty, covert, and silent. They have the tools, skills, time, and patience to unleash underground attacks on even the most fortified walls. Last year, these masters of stealth managed to sneak into some of the world’s biggest establishments causing millions of dollars in loss. Cyber attackers, not ninjas. However, the two are remarkably similar.

2014 at a Glance: The Year of the Mega Breach

Ninjas of the 21st century increasingly rely on the Internet and advanced technology to carry out their operations. Newsworthy data breaches were hot headlines throughout 2014, also called, “The Year of the Mega Breach.”

48%

increase in cyberattacksin 2014 [1]

Records Exposed

- JP Morgan- Target- Anthem- Ebay- Sony PSN- Home Depot

76,000,00070,000,00080,000,000145,000,00077,000,00056,000,000

What Were They After?

Some cyber-ninjas were after credit card information for financial fraud. Some were stealing personal identities to sell to the black market.

Credit Cards Emails Identities CompanySecrets

HealthInformation

PersonalPhotos

Tools of Attack

Cyber-ninjas are able to use a combination of old tools and new weapons to work their way in and attack your systems. Malware is like a poison, spreading into your infrastructure. Social engineering is an older, but highly effective, way to steal credentials from employees. Botnets are a network of private computers that the attacker infects and then controls without the user’s knowledge.

TOP 3TOOLS:

167%

increase in mobile malwareacross all platforms

in 2014 [4]

Malware

SocialEngineering

Botnets

Who Was Affected?

Cyber-ninjas gained access to more than one billion records in 2014 alone with victims from every demographic.

In 2014, 1 in 4 Americans were affected by the mega-breaches at large corporations.

What is the Cost of Cybercrime? What Can You Do About It?

Even security experts agree that no security strategy is 100% effective, but that does not mean organizations are powerless against cyber attackers. Modern cybersecurity is trending away from “Prevention and Mitigation” towards “Detection and Response.”

1.84 million people were affected by medical identity theft.

There was a 600% increase in the number of people impacted by data breaches .

$12.7 millionin company losses

$445 billionin national losses

1. Know Your Environment2. End-User Visibility3. Know Your Enemies4. Prioritize Critical Data5. Understand Your Weaknesses

Secure Your Enterprise! Learn more about enterprise security and compliance solutions with Centre Technologies.

www.centretechnologies.com

Sources:1. http://www.pwc.com/gx/en/consulting-services/information-security-survey/key-findings.jhtml2. http://www.forbes.com/sites/moneybuilder/2015/01/13/the-big-data-breaches-of-2014/3. http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf4. http://www.forbes.com/sites/katevinton/2014/06/24/mobile-malware-is-on-the-rise-mcafee-report-reveals/5. http://www.consumerreports.org/cro/news/2015/05/70-million-americans-report-stolen-data/index.htm6. http://www.healthcare-informatics.com/article/medical-identity-theft-affecting-184-million-us-victims-report7. http://www.forbes.com/sites/gregorymcneal/2014/10/31/california-attorney-general-reports-600-increase-in-number-of -people-impacted-by-data-breaches/8. http://www.heritage.org/research/reports/2014/10/cyber-attacks-on-us-companies-in-20149. http://www.insurancejournal.com/news/national/2014/06/09/331333.htm10. http://fortune.com/2015/04/21/rsa-conference-amit-yoran-keynote/

[2]

[3]

[5]

[6]

[7]

[8] [9]

[10]