SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
12 Must-Know
Cybersecurity
Stats of 2014
1.) Hackers have exposed the personal
information of 110 million Americans –
roughly half of the nation’s adults – in
the last 12 months. 
12 Must-Know Cybersecurity Stats of 2014
! Point 1
! Point 2
! Point 3
2.) Globally,
cyber crime costs
businesses
$365-$575 billion
annually and causes
a net loss of up to
200,000 jobs in the
U.S. alone.
12 Must-Know Cybersecurity Stats of 2014
3.) 47% of U.S. Adults
Had their personal information "
exposed by hackers in 2014. 

4.) 43% of C-level Execs"
Say negligent insiders "
are the greatest threat to sensitive data.

12 Must-Know Cybersecurity Stats of 2014
5.) 92% of data
breaches can be
described by just
nine distinct
patterns
! Cyber-Espionage
! DOS attacks 
! Crimeware
! Web App Attacks
! Insider Misuse 
! Miscellaneous errors
! Physical Theft and Loss
! Payment Card Skimmers
12 Must-Know Cybersecurity Stats of 2014
6.) With the number of exploitable
browser vulnerabilities accelerating this
year, 72% of the 685 IT decision-
makers questioned said this made
security difficult in their organization,
more so than any other issue. 
12 Must-Know Cybersecurity Stats of 2014
7.) 19% of major cyber attacks reported
are considered “constant” by the
targeted organization.
This is up dramatically from a reported
6% in previous years, not even
including weeklong and month-long
attacks.
12 Must-Know Cybersecurity Stats of 2014
8.) Despite Mac OSX’s
reputation for being the
most immune OS to
malwares and bugs,
users have received
over 1,499 new
malicious programs.
12 Must-Know Cybersecurity Stats of 2014
9.) Geographically, Mac
users in US suffered the
most malware infections in
2014, contributing
to 39.14% of all reported
attacks, followed by
Germany 12.56%, Japan
5.51% UK 5.49% Russia
4.87% and France 3.69%.
12 Must-Know Cybersecurity Stats of 2014
10.) While a significant level of business
decision-makers acknowledge the
importance of data (82%), only a
minority (35%) report that their
organization spends at least 10% of its
IT budget on data security. 
12 Must-Know Cybersecurity Stats of 2014
11.) Looking Ahead: In 2015, the
security service spending is projected
to amount to $49,140 million U.S.
dollars worldwide.

12 Must-Know Cybersecurity Stats of 2014
12.) Around 1 in 3
senior executives
is unaware of the
amount of IT
budget allocated
to data security in
their organization
or admits that it is
not a high priority. 
12 Must-Know Cybersecurity Stats of 2014
Thanks for Viewing!
Sources for the 12 Must-Know Cybersecurity Stats for 2014:
!  1.) http://money.cnn.com/2014/05/28/technology/security/hack-data-breach/, Ponemon Institute.
!  2.) http://blog.wildpackets.com/2014/10/28/10-cyber-security-stats-every-cio-should-know.html, McAfee, “Net Losses:
Estimating the Global Cost of Cybercrime” 
!  3.) http://money.cnn.com/2014/05/28/technology/security/hack-data-breach/, Ponemon Institute
!  4.) http://blog.wildpackets.com/2014/10/28/10-cyber-security-stats-every-cio-should-know.html, IBM services
!  5.) http://www.verizonenterprise.com/DBIR/2014/insider/, Verizon, “2014 Data Breach Investigations Report”
!  6.) http://www.net-security.org/secworld.php?id=17745, Malwarebytes
!  7.) http://www.net-security.org/secworld.php?id=17742, Radware
!  8.) http://securityaffairs.co/wordpress/30999/cyber-crime/mac-os-x-no-malware-immune.html, Kaspersky Labs
!  9.) http://securityaffairs.co/wordpress/30999/cyber-crime/mac-os-x-no-malware-immune.html, Kaspersky Labs
!  10.) http://www.infosecurity-magazine.com/news/senior-execs-undervalue-data/ 
, NTT Com Security
!  11.) http://www.statista.com/statistics/217362/worldwide-it-security-spending-since-2010/, Statista
!  12.) http://www.infosecurity-magazine.com/news/senior-execs-undervalue-data/, NTT Com Security
12 Must-Know Cybersecurity Stats of 2014
Want to learn how to
prepare your clients with
an effective backup and
disaster recovery
solution? Download this
eBook and get started. !"

Weitere ähnliche Inhalte

Andere mochten auch

how does smart phone works?
how does smart phone works?how does smart phone works?
how does smart phone works?Sakshi Bhargava
 
BRC Introduction Ppt
BRC Introduction PptBRC Introduction Ppt
BRC Introduction PptRam Kumar G
 
Personal Profile Template
Personal Profile TemplatePersonal Profile Template
Personal Profile TemplateHaiku Deck
 
Smart uses of smart phone for students
Smart uses of smart phone for studentsSmart uses of smart phone for students
Smart uses of smart phone for studentsSaransh Arora
 
Ram Kumar G Personal Profile
Ram Kumar G   Personal ProfileRam Kumar G   Personal Profile
Ram Kumar G Personal ProfileRam Kumar G
 
Executive assistant resume
Executive assistant resume Executive assistant resume
Executive assistant resume Dagmara Drab
 
Smart Use of Smart Phone by Chheda Sanjay Visanji
Smart Use of Smart Phone by Chheda Sanjay VisanjiSmart Use of Smart Phone by Chheda Sanjay Visanji
Smart Use of Smart Phone by Chheda Sanjay VisanjiSanjay Visanji Chheda
 
[Wroclaw #5] OWASP Projects: beyond Top 10
[Wroclaw #5] OWASP Projects: beyond Top 10[Wroclaw #5] OWASP Projects: beyond Top 10
[Wroclaw #5] OWASP Projects: beyond Top 10OWASP
 
An example: Using ppt for resume
An example: Using ppt for resumeAn example: Using ppt for resume
An example: Using ppt for resumeJia Liu
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerProlifics
 

Andere mochten auch (11)

how does smart phone works?
how does smart phone works?how does smart phone works?
how does smart phone works?
 
BRC Introduction Ppt
BRC Introduction PptBRC Introduction Ppt
BRC Introduction Ppt
 
Personal Profile Template
Personal Profile TemplatePersonal Profile Template
Personal Profile Template
 
Smart uses of smart phone for students
Smart uses of smart phone for studentsSmart uses of smart phone for students
Smart uses of smart phone for students
 
Ram Kumar G Personal Profile
Ram Kumar G   Personal ProfileRam Kumar G   Personal Profile
Ram Kumar G Personal Profile
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
Executive assistant resume
Executive assistant resume Executive assistant resume
Executive assistant resume
 
Smart Use of Smart Phone by Chheda Sanjay Visanji
Smart Use of Smart Phone by Chheda Sanjay VisanjiSmart Use of Smart Phone by Chheda Sanjay Visanji
Smart Use of Smart Phone by Chheda Sanjay Visanji
 
[Wroclaw #5] OWASP Projects: beyond Top 10
[Wroclaw #5] OWASP Projects: beyond Top 10[Wroclaw #5] OWASP Projects: beyond Top 10
[Wroclaw #5] OWASP Projects: beyond Top 10
 
An example: Using ppt for resume
An example: Using ppt for resumeAn example: Using ppt for resume
An example: Using ppt for resume
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 

Mehr von Continuum

6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to Market6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to MarketContinuum
 
7 Challenges MSPs Face When Looking to Build Long-Term BDR Success
7 Challenges MSPs Face When Looking to Build Long-Term BDR Success7 Challenges MSPs Face When Looking to Build Long-Term BDR Success
7 Challenges MSPs Face When Looking to Build Long-Term BDR SuccessContinuum
 
5 Managed Services to Sell and How to Sell Them
5 Managed Services to Sell and How to Sell Them5 Managed Services to Sell and How to Sell Them
5 Managed Services to Sell and How to Sell ThemContinuum
 
Getting Started with SEO & Google Analytics: 5 Steps to Improving Your Website
Getting Started with SEO & Google Analytics: 5 Steps to Improving Your WebsiteGetting Started with SEO & Google Analytics: 5 Steps to Improving Your Website
Getting Started with SEO & Google Analytics: 5 Steps to Improving Your WebsiteContinuum
 
Navigate 2014 Slideshow
Navigate 2014 SlideshowNavigate 2014 Slideshow
Navigate 2014 SlideshowContinuum
 
12 Movie Quotes You've Probably Said as an MSP
12 Movie Quotes You've Probably Said as an MSP12 Movie Quotes You've Probably Said as an MSP
12 Movie Quotes You've Probably Said as an MSPContinuum
 
Getting Started with Twitter
Getting Started with TwitterGetting Started with Twitter
Getting Started with TwitterContinuum
 

Mehr von Continuum (7)

6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to Market6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to Market
 
7 Challenges MSPs Face When Looking to Build Long-Term BDR Success
7 Challenges MSPs Face When Looking to Build Long-Term BDR Success7 Challenges MSPs Face When Looking to Build Long-Term BDR Success
7 Challenges MSPs Face When Looking to Build Long-Term BDR Success
 
5 Managed Services to Sell and How to Sell Them
5 Managed Services to Sell and How to Sell Them5 Managed Services to Sell and How to Sell Them
5 Managed Services to Sell and How to Sell Them
 
Getting Started with SEO & Google Analytics: 5 Steps to Improving Your Website
Getting Started with SEO & Google Analytics: 5 Steps to Improving Your WebsiteGetting Started with SEO & Google Analytics: 5 Steps to Improving Your Website
Getting Started with SEO & Google Analytics: 5 Steps to Improving Your Website
 
Navigate 2014 Slideshow
Navigate 2014 SlideshowNavigate 2014 Slideshow
Navigate 2014 Slideshow
 
12 Movie Quotes You've Probably Said as an MSP
12 Movie Quotes You've Probably Said as an MSP12 Movie Quotes You've Probably Said as an MSP
12 Movie Quotes You've Probably Said as an MSP
 
Getting Started with Twitter
Getting Started with TwitterGetting Started with Twitter
Getting Started with Twitter
 

Kürzlich hochgeladen

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 

Kürzlich hochgeladen (20)

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 

12 Must-Know Cybersecurity Stats of 2014

  • 2. 1.) Hackers have exposed the personal information of 110 million Americans – roughly half of the nation’s adults – in the last 12 months. 12 Must-Know Cybersecurity Stats of 2014
  • 3. ! Point 1 ! Point 2 ! Point 3 2.) Globally, cyber crime costs businesses $365-$575 billion annually and causes a net loss of up to 200,000 jobs in the U.S. alone. 12 Must-Know Cybersecurity Stats of 2014
  • 4. 3.) 47% of U.S. Adults Had their personal information " exposed by hackers in 2014. 4.) 43% of C-level Execs" Say negligent insiders " are the greatest threat to sensitive data. 12 Must-Know Cybersecurity Stats of 2014
  • 5. 5.) 92% of data breaches can be described by just nine distinct patterns ! Cyber-Espionage ! DOS attacks ! Crimeware ! Web App Attacks ! Insider Misuse ! Miscellaneous errors ! Physical Theft and Loss ! Payment Card Skimmers 12 Must-Know Cybersecurity Stats of 2014
  • 6. 6.) With the number of exploitable browser vulnerabilities accelerating this year, 72% of the 685 IT decision- makers questioned said this made security difficult in their organization, more so than any other issue. 12 Must-Know Cybersecurity Stats of 2014
  • 7. 7.) 19% of major cyber attacks reported are considered “constant” by the targeted organization. This is up dramatically from a reported 6% in previous years, not even including weeklong and month-long attacks. 12 Must-Know Cybersecurity Stats of 2014
  • 8. 8.) Despite Mac OSX’s reputation for being the most immune OS to malwares and bugs, users have received over 1,499 new malicious programs. 12 Must-Know Cybersecurity Stats of 2014
  • 9. 9.) Geographically, Mac users in US suffered the most malware infections in 2014, contributing to 39.14% of all reported attacks, followed by Germany 12.56%, Japan 5.51% UK 5.49% Russia 4.87% and France 3.69%. 12 Must-Know Cybersecurity Stats of 2014
  • 10. 10.) While a significant level of business decision-makers acknowledge the importance of data (82%), only a minority (35%) report that their organization spends at least 10% of its IT budget on data security. 12 Must-Know Cybersecurity Stats of 2014
  • 11. 11.) Looking Ahead: In 2015, the security service spending is projected to amount to $49,140 million U.S. dollars worldwide. 12 Must-Know Cybersecurity Stats of 2014
  • 12. 12.) Around 1 in 3 senior executives is unaware of the amount of IT budget allocated to data security in their organization or admits that it is not a high priority. 12 Must-Know Cybersecurity Stats of 2014
  • 13. Thanks for Viewing! Sources for the 12 Must-Know Cybersecurity Stats for 2014: !  1.) http://money.cnn.com/2014/05/28/technology/security/hack-data-breach/, Ponemon Institute. !  2.) http://blog.wildpackets.com/2014/10/28/10-cyber-security-stats-every-cio-should-know.html, McAfee, “Net Losses: Estimating the Global Cost of Cybercrime” !  3.) http://money.cnn.com/2014/05/28/technology/security/hack-data-breach/, Ponemon Institute !  4.) http://blog.wildpackets.com/2014/10/28/10-cyber-security-stats-every-cio-should-know.html, IBM services !  5.) http://www.verizonenterprise.com/DBIR/2014/insider/, Verizon, “2014 Data Breach Investigations Report” !  6.) http://www.net-security.org/secworld.php?id=17745, Malwarebytes !  7.) http://www.net-security.org/secworld.php?id=17742, Radware !  8.) http://securityaffairs.co/wordpress/30999/cyber-crime/mac-os-x-no-malware-immune.html, Kaspersky Labs !  9.) http://securityaffairs.co/wordpress/30999/cyber-crime/mac-os-x-no-malware-immune.html, Kaspersky Labs !  10.) http://www.infosecurity-magazine.com/news/senior-execs-undervalue-data/ , NTT Com Security !  11.) http://www.statista.com/statistics/217362/worldwide-it-security-spending-since-2010/, Statista !  12.) http://www.infosecurity-magazine.com/news/senior-execs-undervalue-data/, NTT Com Security 12 Must-Know Cybersecurity Stats of 2014 Want to learn how to prepare your clients with an effective backup and disaster recovery solution? Download this eBook and get started. !"