SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
CYBER ATTACKS:
How to Ninja-Proof Your Data
They’re crafty, covert, and silent. They have the tools,
skills, time, and patience to unleash underground
attacks on even the most fortified walls. Last year,
these masters of stealth managed to sneak into
some of the world’s biggest establishments causing
millions of dollars in loss. Cyber attackers, not ninjas.
However, the two are remarkably similar.
2014 at a Glance: The Year of the Mega Breach
Ninjas of the 21st century increasingly rely on the Internet and advanced technology to carry out their
operations. Newsworthy data breaches were hot headlines throughout 2014, also called, “The Year of
the Mega Breach.”
48%
increase in cyberattacks
in 2014 [1]
Records Exposed
- JP Morgan
- Target
- Anthem
- Ebay
- Sony PSN
- Home Depot
76,000,000
70,000,000
80,000,000
145,000,000
77,000,000
56,000,000
What Were They After?
Some cyber-ninjas were after credit card information for financial fraud. Some were stealing personal
identities to sell to the black market.
Credit Cards Emails Identities Company
Secrets
Health
Information
Personal
Photos
Tools of Attack
Cyber-ninjas are able to use a combination of old tools and new weapons to work their way in and
attack your systems. Malware is like a poison, spreading into your infrastructure. Social engineering is
an older, but highly effective, way to steal credentials from employees. Botnets are a network of
private computers that the attacker infects and then controls without the user’s knowledge.
TOP 3
TOOLS:
167%
increase in mobile malware
across all platforms
in 2014 [4]
Malware
Social
Engineering
Botnets
Who Was Affected?
Cyber-ninjas gained access to more than one billion records in 2014 alone with victims from every
demographic.
In 2014, 1 in 4 Americans were
affected by the mega-breaches
at large corporations.
What is the Cost of Cybercrime? What Can You Do About It?
Even security experts agree that no security
strategy is 100% effective, but that does not
mean organizations are powerless against cyber
attackers. Modern cybersecurity is trending
away from “Prevention and Mitigation” towards
“Detection and Response.”
1.84 million people were affected
by medical identity theft.
There was a 600% increase in
the number of people impacted
by data breaches .
$12.7 million
in company losses
$445 billion
in national losses
1. Know Your Environment
2. End-User Visibility
3. Know Your Enemies
4. Prioritize Critical Data
5. Understand Your Weaknesses
Secure Your Enterprise!
Learn more about enterprise security and compliance solutions with Centre Technologies.
www.centretechnologies.com
Sources:
1. http://www.pwc.com/gx/en/consulting-services/information-security-survey/key-findings.jhtml
2. http://www.forbes.com/sites/moneybuilder/2015/01/13/the-big-data-breaches-of-2014/
3. http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf
4. http://www.forbes.com/sites/katevinton/2014/06/24/mobile-malware-is-on-the-rise-mcafee-report-reveals/
5. http://www.consumerreports.org/cro/news/2015/05/70-million-americans-report-stolen-data/index.htm
6. http://www.healthcare-informatics.com/article/medical-identity-theft-affecting-184-million-us-victims-report
7. http://www.forbes.com/sites/gregorymcneal/2014/10/31/california-attorney-general-reports-600-increase-in-number-of
-people-impacted-by-data-breaches/
8. http://www.heritage.org/research/reports/2014/10/cyber-attacks-on-us-companies-in-2014
9. http://www.insurancejournal.com/news/national/2014/06/09/331333.htm
10. http://fortune.com/2015/04/21/rsa-conference-amit-yoran-keynote/
[2]
[3]
[5]
[6]
[7]
[8] [9]
[10]

Weitere ähnliche Inhalte

Was ist angesagt?

Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five yearsSABBY GILL
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO CompliancePECB
 
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationCyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationBrad Deflin
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPaloAltoNetworks
 
Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...IT Arena
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifelAhmed Tememe
 
Future of Cyber-security Economy
Future of Cyber-security EconomyFuture of Cyber-security Economy
Future of Cyber-security EconomyBehnaz Aria
 
IDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentIDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentBee_Ware
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingCigniti Technologies Ltd
 
DSS @SFK Conference_2012_Cybercrime_welcomes_you
DSS @SFK Conference_2012_Cybercrime_welcomes_youDSS @SFK Conference_2012_Cybercrime_welcomes_you
DSS @SFK Conference_2012_Cybercrime_welcomes_youAndris Soroka
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaAvinash Sinha
 
2014 information technology threat predictions
2014 information technology threat predictions2014 information technology threat predictions
2014 information technology threat predictionsPrayukth K V
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
 
Cybersecurity in the gambling industry
Cybersecurity in the gambling industryCybersecurity in the gambling industry
Cybersecurity in the gambling industryFilippo Ferri
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011Andrea Rossetti
 

Was ist angesagt? (20)

Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO Compliance
 
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationCyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop Presentation
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity Predictions
 
Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Future of Cyber-security Economy
Future of Cyber-security EconomyFuture of Cyber-security Economy
Future of Cyber-security Economy
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
IDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentIDC - Security : From Pain To Empowerment
IDC - Security : From Pain To Empowerment
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 
DSS @SFK Conference_2012_Cybercrime_welcomes_you
DSS @SFK Conference_2012_Cybercrime_welcomes_youDSS @SFK Conference_2012_Cybercrime_welcomes_you
DSS @SFK Conference_2012_Cybercrime_welcomes_you
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
 
2014 information technology threat predictions
2014 information technology threat predictions2014 information technology threat predictions
2014 information technology threat predictions
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
Cybersecurity in the gambling industry
Cybersecurity in the gambling industryCybersecurity in the gambling industry
Cybersecurity in the gambling industry
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 

Ähnlich wie Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies

Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceSymantec
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101Welch LLP
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr. Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr. EvonCanales257
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016Core Security
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxThe Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxjiyalouis
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019PECB
 

Ähnlich wie Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies (20)

Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Why_TG
Why_TGWhy_TG
Why_TG
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
Apresentação Allen ES
Apresentação Allen ESApresentação Allen ES
Apresentação Allen ES
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr. Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxThe Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 

Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies

  • 1. CYBER ATTACKS: How to Ninja-Proof Your Data They’re crafty, covert, and silent. They have the tools, skills, time, and patience to unleash underground attacks on even the most fortified walls. Last year, these masters of stealth managed to sneak into some of the world’s biggest establishments causing millions of dollars in loss. Cyber attackers, not ninjas. However, the two are remarkably similar. 2014 at a Glance: The Year of the Mega Breach Ninjas of the 21st century increasingly rely on the Internet and advanced technology to carry out their operations. Newsworthy data breaches were hot headlines throughout 2014, also called, “The Year of the Mega Breach.” 48% increase in cyberattacks in 2014 [1] Records Exposed - JP Morgan - Target - Anthem - Ebay - Sony PSN - Home Depot 76,000,000 70,000,000 80,000,000 145,000,000 77,000,000 56,000,000 What Were They After? Some cyber-ninjas were after credit card information for financial fraud. Some were stealing personal identities to sell to the black market. Credit Cards Emails Identities Company Secrets Health Information Personal Photos Tools of Attack Cyber-ninjas are able to use a combination of old tools and new weapons to work their way in and attack your systems. Malware is like a poison, spreading into your infrastructure. Social engineering is an older, but highly effective, way to steal credentials from employees. Botnets are a network of private computers that the attacker infects and then controls without the user’s knowledge. TOP 3 TOOLS: 167% increase in mobile malware across all platforms in 2014 [4] Malware Social Engineering Botnets Who Was Affected? Cyber-ninjas gained access to more than one billion records in 2014 alone with victims from every demographic. In 2014, 1 in 4 Americans were affected by the mega-breaches at large corporations. What is the Cost of Cybercrime? What Can You Do About It? Even security experts agree that no security strategy is 100% effective, but that does not mean organizations are powerless against cyber attackers. Modern cybersecurity is trending away from “Prevention and Mitigation” towards “Detection and Response.” 1.84 million people were affected by medical identity theft. There was a 600% increase in the number of people impacted by data breaches . $12.7 million in company losses $445 billion in national losses 1. Know Your Environment 2. End-User Visibility 3. Know Your Enemies 4. Prioritize Critical Data 5. Understand Your Weaknesses Secure Your Enterprise! Learn more about enterprise security and compliance solutions with Centre Technologies. www.centretechnologies.com Sources: 1. http://www.pwc.com/gx/en/consulting-services/information-security-survey/key-findings.jhtml 2. http://www.forbes.com/sites/moneybuilder/2015/01/13/the-big-data-breaches-of-2014/ 3. http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf 4. http://www.forbes.com/sites/katevinton/2014/06/24/mobile-malware-is-on-the-rise-mcafee-report-reveals/ 5. http://www.consumerreports.org/cro/news/2015/05/70-million-americans-report-stolen-data/index.htm 6. http://www.healthcare-informatics.com/article/medical-identity-theft-affecting-184-million-us-victims-report 7. http://www.forbes.com/sites/gregorymcneal/2014/10/31/california-attorney-general-reports-600-increase-in-number-of -people-impacted-by-data-breaches/ 8. http://www.heritage.org/research/reports/2014/10/cyber-attacks-on-us-companies-in-2014 9. http://www.insurancejournal.com/news/national/2014/06/09/331333.htm 10. http://fortune.com/2015/04/21/rsa-conference-amit-yoran-keynote/ [2] [3] [5] [6] [7] [8] [9] [10]