Magic exist by Marta Loveguard - presentation.pptx
Top 5 Cyber Threats of 2014
1. Top 5 Cyber Threats of
2014
which you and your company
should be aware of
2. #1 BYOD Trend in the Workplace
Threatscome along with the increasing popularity of Bring-Your-Own-Device
(BYOD). Text-based malware attacks, for instance, can steal contacts and send out
fake messages to other users, and infect them.
3. #2 Social Media
As social media platforms continue appealing to companies in 2014, attackers use
increasingly professional websites (e.g. LinkedIn), to research and lure executives.
This highly targeted method is be used to gather intelligence and
compromise networks.
4. #3 Data Privacy in the Cloud
When moving sensitive data to the cloud,
organizations must know whether the information about an individual is
personally identifiable information (PII) as regulations for the protection of it
and penaltiesexist.
5. #4 Hacker marketplace
The market for effective software ‘exploit
kits’ has grown so quickly that some
hackers package the most dangerous
versions together and sell them online to
less-skilled troublemakers. Attacks
are replaced with more focused
efforts on specificity rather than on
size.
6. #5 Accidental backlash
Some companies take the fight to hackers. Intelligent hackers will get better
at masking their location and actively direct companies to legitimate web
hosts or Internet Service Providers (ISPs). If this kind of ‘offensive security’
ends up taking down a competitor's server or a government website, there
will be serious repercussions.
7. Awarenessis the first step in prevention
Analysis of attack patternsand collaborationwith trusted
vendors are critical for long-term success.
8. 82 %of global leaders have already started collaborating
with other companies to combat cybersecurity threats.
And your company?