Upload
centre-technologies
View
38
Download
1
Tags:
Embed Size (px)
Citation preview
CYBER ATTACKS:How to Ninja-Proof Your Data
They’re crafty, covert, and silent. They have the tools, skills, time, and patience to unleash underground attacks on even the most fortified walls. Last year, these masters of stealth managed to sneak into some of the world’s biggest establishments causing millions of dollars in loss. Cyber attackers, not ninjas. However, the two are remarkably similar.
2014 at a Glance: The Year of the Mega Breach
Ninjas of the 21st century increasingly rely on the Internet and advanced technology to carry out their operations. Newsworthy data breaches were hot headlines throughout 2014, also called, “The Year of the Mega Breach.”
48%
increase in cyberattacksin 2014 [1]
Records Exposed
- JP Morgan- Target- Anthem- Ebay- Sony PSN- Home Depot
76,000,00070,000,00080,000,000145,000,00077,000,00056,000,000
What Were They After?
Some cyber-ninjas were after credit card information for financial fraud. Some were stealing personal identities to sell to the black market.
Credit Cards Emails Identities CompanySecrets
HealthInformation
PersonalPhotos
Tools of Attack
Cyber-ninjas are able to use a combination of old tools and new weapons to work their way in and attack your systems. Malware is like a poison, spreading into your infrastructure. Social engineering is an older, but highly effective, way to steal credentials from employees. Botnets are a network of private computers that the attacker infects and then controls without the user’s knowledge.
TOP 3TOOLS:
167%
increase in mobile malwareacross all platforms
in 2014 [4]
Malware
SocialEngineering
Botnets
Who Was Affected?
Cyber-ninjas gained access to more than one billion records in 2014 alone with victims from every demographic.
In 2014, 1 in 4 Americans were affected by the mega-breaches at large corporations.
What is the Cost of Cybercrime? What Can You Do About It?
Even security experts agree that no security strategy is 100% effective, but that does not mean organizations are powerless against cyber attackers. Modern cybersecurity is trending away from “Prevention and Mitigation” towards “Detection and Response.”
1.84 million people were affected by medical identity theft.
There was a 600% increase in the number of people impacted by data breaches .
$12.7 millionin company losses
$445 billionin national losses
1. Know Your Environment2. End-User Visibility3. Know Your Enemies4. Prioritize Critical Data5. Understand Your Weaknesses
Secure Your Enterprise! Learn more about enterprise security and compliance solutions with Centre Technologies.
www.centretechnologies.com
Sources:1. http://www.pwc.com/gx/en/consulting-services/information-security-survey/key-findings.jhtml2. http://www.forbes.com/sites/moneybuilder/2015/01/13/the-big-data-breaches-of-2014/3. http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf4. http://www.forbes.com/sites/katevinton/2014/06/24/mobile-malware-is-on-the-rise-mcafee-report-reveals/5. http://www.consumerreports.org/cro/news/2015/05/70-million-americans-report-stolen-data/index.htm6. http://www.healthcare-informatics.com/article/medical-identity-theft-affecting-184-million-us-victims-report7. http://www.forbes.com/sites/gregorymcneal/2014/10/31/california-attorney-general-reports-600-increase-in-number-of -people-impacted-by-data-breaches/8. http://www.heritage.org/research/reports/2014/10/cyber-attacks-on-us-companies-in-20149. http://www.insurancejournal.com/news/national/2014/06/09/331333.htm10. http://fortune.com/2015/04/21/rsa-conference-amit-yoran-keynote/
[2]
[3]
[5]
[6]
[7]
[8] [9]
[10]