SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Achilles Heel of Email
Think Stock
www.cloudnician.com
by
James O. Grundvig
EVOLUTION OF
EMAIL
2
Route 80 Project
North Jersey
NJ-DOT HQ
Trenton, NJ
12 kb file
(Cover Sheet)
1 9 9 2
Email Replaces Fax One Page at a Time
email
20 Minutes – 60 Miles
Think Stock Think Stock
3
 10 million email accounts
 16 million Internet users
 25,000 websites
 Dial-up Internet Service
THE BIG BANG
INTERNET
1 9 9 5
Netscape’s Web Browser Opens the Internet
Think Stock
4
TIMELINE
TSUNAMI OF
SPAM EMAIL
SPAM
E
V
E
N
T
2004 2009 2013
Spam
costs
firms
$130
billion
5
Spammers
arrested
DropBox
Users
complain
of Spam
1995
10m
email
3.6 B
email
Think Stock
5
SOCIAL ENGINEERING
OF EMAIL
2 0 1 2
Hackers Exploit People
 Your friends can be used
against you
Think Stock
 People are the weak link
 Data Trolls your online life
 29% of cyber attacks are
conducted via email
DE-EVOLUTION OF
EMAIL
email
6
Think Stock Think Stock Think Stock
BRIGHT IDEA
OF EMAIL…
1 to Many
Communication
Send Attached Files
Become more
productive but. . .
email
7Think Stock
8
15 hrs
week
$28,000/yr
Lost time
 918 million corporate email
accounts
 105 emails sent per user
INEFFICIENCY
OF EMAIL
 300 million emails sent each
day are “poison darts”
 37% users don’t reply to email
 Email wasn’t designed to be
collaborative
9
DATA BREACH COSTS
TELECOM GIANT
“High-tech spies managed to infiltrate Telenor’s extensive security
network and empty the contents of the top executives’ personal
computers.” – Afterposten 3-17-13.
Telenor
$18B
31K
20
monitor
traffic
1open
zip file
Rev.
Employ.
10
MORE DATA BREACHES
BY EMAIL
2012
Attacks
- 68.2% done by hackers
- 267 million records exposed
- 1 email exposed S. Carolina’s
3.8 million tax returns
- Evernote didn’t follow own
training: employee opened
“reset” password email (4-19-13)
email
11Think Stock
HEALTHCARE
EXPOSURE TO EMAIL H
12
BOSTON MARATHON
BOMBING
Wounded Suspect brought to
Beth Israel Deaconess MC…
Halls
Empty
Police
Lockdown
Hospital
What if a Terrorist launched a
Cyber Attack on the IT Systems?
H
Think Stock
13
Patient Privacy
& Data Security H
 $2.4 million (2-year) avg.
cost to organization in PHI
 45% claim >5 breaches (up
from 29% in 2010)
 2,769 stolen records/breach
 75% don’t secure medical
devices contain patient data
 94% have leaked data
14
WHICH PATIENT DATA
BREACH IS WORSE? H
 Class-Action lawsuit Glen Falls Hospital NY
 Class-Action lawsuit 22 Florida Hospitals
 Wyoming Doctor’s personal email exposes
2,900 patient records
 Oregon H&SU hacked twice in same year
 2 Breaches, 2 States, 2 Hospitals, Same Day
– Utah & Mississippi
15
CAN WE SECURE DATA?
email
ePhish training
won’t work
Think Stock
16
SEPARATION OF
EMAIL & STATE
EMAIL
SERVER
Off-Premise
Cloud
Corporate IT Network
(on-premise)
External
Communication
FIREWALL
Few Employees
have email
Is this the New Paradigm?
17
NEW CHALLENGE
OF BYOD
Off-Premise
Cloud
DB1
DB3
DB2
- Remote locations
- Multiple devices
- How do we Secure?
Think Stock

Weitere ähnliche Inhalte

Andere mochten auch (13)

Final Project - ITC5330
Final Project - ITC5330Final Project - ITC5330
Final Project - ITC5330
 
25 de mayo
25 de mayo25 de mayo
25 de mayo
 
Kisah katak (Konsep kendiri)
Kisah katak (Konsep kendiri)Kisah katak (Konsep kendiri)
Kisah katak (Konsep kendiri)
 
Part 1
Part 1Part 1
Part 1
 
Conocimiento
ConocimientoConocimiento
Conocimiento
 
Tiger Capabilities
Tiger CapabilitiesTiger Capabilities
Tiger Capabilities
 
crusades-elorm, julia, emley, collin
crusades-elorm, julia, emley, collincrusades-elorm, julia, emley, collin
crusades-elorm, julia, emley, collin
 
Part 1
Part 1Part 1
Part 1
 
Fisiopatología del dolor gus
Fisiopatología del dolor  gusFisiopatología del dolor  gus
Fisiopatología del dolor gus
 
PINsafe by SWIVEL
PINsafe by SWIVELPINsafe by SWIVEL
PINsafe by SWIVEL
 
Duncan enterprises is a regional reseller of epaymentamerica
Duncan enterprises is a regional reseller of epaymentamericaDuncan enterprises is a regional reseller of epaymentamerica
Duncan enterprises is a regional reseller of epaymentamerica
 
Bus inovation for the future
Bus inovation for the futureBus inovation for the future
Bus inovation for the future
 
Diferencias entre enrutamiento estático y dinámico
Diferencias entre enrutamiento estático y dinámicoDiferencias entre enrutamiento estático y dinámico
Diferencias entre enrutamiento estático y dinámico
 

Ähnlich wie Email IT Security Breaches

Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
FecomercioSP
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
Fahad Abbasi
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
rothl
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
rothl
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
smile790243
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
ericbrooks84875
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
UltraUploader
 

Ähnlich wie Email IT Security Breaches (20)

Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
 
eCrime Conference March 2006
eCrime Conference March 2006eCrime Conference March 2006
eCrime Conference March 2006
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
Report on hacking crime and workable solution
Report on hacking crime and workable solutionReport on hacking crime and workable solution
Report on hacking crime and workable solution
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Email IT Security Breaches

  • 1. Achilles Heel of Email Think Stock www.cloudnician.com by James O. Grundvig
  • 2. EVOLUTION OF EMAIL 2 Route 80 Project North Jersey NJ-DOT HQ Trenton, NJ 12 kb file (Cover Sheet) 1 9 9 2 Email Replaces Fax One Page at a Time email 20 Minutes – 60 Miles Think Stock Think Stock
  • 3. 3  10 million email accounts  16 million Internet users  25,000 websites  Dial-up Internet Service THE BIG BANG INTERNET 1 9 9 5 Netscape’s Web Browser Opens the Internet Think Stock
  • 4. 4 TIMELINE TSUNAMI OF SPAM EMAIL SPAM E V E N T 2004 2009 2013 Spam costs firms $130 billion 5 Spammers arrested DropBox Users complain of Spam 1995 10m email 3.6 B email Think Stock
  • 5. 5 SOCIAL ENGINEERING OF EMAIL 2 0 1 2 Hackers Exploit People  Your friends can be used against you Think Stock  People are the weak link  Data Trolls your online life  29% of cyber attacks are conducted via email
  • 7. BRIGHT IDEA OF EMAIL… 1 to Many Communication Send Attached Files Become more productive but. . . email 7Think Stock
  • 8. 8 15 hrs week $28,000/yr Lost time  918 million corporate email accounts  105 emails sent per user INEFFICIENCY OF EMAIL  300 million emails sent each day are “poison darts”  37% users don’t reply to email  Email wasn’t designed to be collaborative
  • 9. 9 DATA BREACH COSTS TELECOM GIANT “High-tech spies managed to infiltrate Telenor’s extensive security network and empty the contents of the top executives’ personal computers.” – Afterposten 3-17-13. Telenor $18B 31K 20 monitor traffic 1open zip file Rev. Employ.
  • 10. 10 MORE DATA BREACHES BY EMAIL 2012 Attacks - 68.2% done by hackers - 267 million records exposed - 1 email exposed S. Carolina’s 3.8 million tax returns - Evernote didn’t follow own training: employee opened “reset” password email (4-19-13) email
  • 12. 12 BOSTON MARATHON BOMBING Wounded Suspect brought to Beth Israel Deaconess MC… Halls Empty Police Lockdown Hospital What if a Terrorist launched a Cyber Attack on the IT Systems? H Think Stock
  • 13. 13 Patient Privacy & Data Security H  $2.4 million (2-year) avg. cost to organization in PHI  45% claim >5 breaches (up from 29% in 2010)  2,769 stolen records/breach  75% don’t secure medical devices contain patient data  94% have leaked data
  • 14. 14 WHICH PATIENT DATA BREACH IS WORSE? H  Class-Action lawsuit Glen Falls Hospital NY  Class-Action lawsuit 22 Florida Hospitals  Wyoming Doctor’s personal email exposes 2,900 patient records  Oregon H&SU hacked twice in same year  2 Breaches, 2 States, 2 Hospitals, Same Day – Utah & Mississippi
  • 15. 15 CAN WE SECURE DATA? email ePhish training won’t work Think Stock
  • 16. 16 SEPARATION OF EMAIL & STATE EMAIL SERVER Off-Premise Cloud Corporate IT Network (on-premise) External Communication FIREWALL Few Employees have email Is this the New Paradigm?
  • 17. 17 NEW CHALLENGE OF BYOD Off-Premise Cloud DB1 DB3 DB2 - Remote locations - Multiple devices - How do we Secure? Think Stock

Hinweis der Redaktion

  1. World’s Fair 1964 to 2013 . . . Half a century, how things have changed.
  2. Sending the cover sheet of a monthly pay requisition.
  3. *Note:Internet World Stats, Net Valley Stats, FactMonster.com
  4. Death by PowerPoint or Death by Email