Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×

Current Trends in Cyber Crime 2015

Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Wird geladen in …3
×

Hier ansehen

1 von 26 Anzeige

Current Trends in Cyber Crime 2015

Herunterladen, um offline zu lesen

A recent presentation given by us (Cybernetic Global Intelligence) on current trends in Cyber Crime and its effect on companies and law firms in Australia.

A recent presentation given by us (Cybernetic Global Intelligence) on current trends in Cyber Crime and its effect on companies and law firms in Australia.

Anzeige
Anzeige

Weitere Verwandte Inhalte

Diashows für Sie (20)

Ähnlich wie Current Trends in Cyber Crime 2015 (20)

Anzeige

Aktuellste (20)

Current Trends in Cyber Crime 2015

  1. 1. A BUSINESS / MARKETING PRESENTATION
  2. 2. WHAT IS CYBERCRIME?
  3. 3. Australian Cyber Crime Act 2001 …an illegal activity carried out against computer data and systems.. The broader definition also includes “computer-related offences, as well as content and copyright infractions”. WHAT IS CYBERCRIME? cybernetic-gi.com
  4. 4. VIDEO https://www.youtube.com/watch?v=l_XOrcBxy-E
  5. 5. Australian Cyber Crime Act 2001 …an illegal activity carried out against computer data and systems.. The broader definition also includes “computer-related offences, as well as content and copyright infractions”. WHAT IS CYBERCRIME? cybernetic-gi.com
  6. 6. ROBERT MUELLER – FBI Director, 2012 There are only two types of companies: those that have been hacked, and those that will be. cybernetic-gi.com
  7. 7. 76 million households & 7 million businesses JPMorgan Chase 2014 · Credit Card Details · Financial Records · Personal Details (phone numbers, addresses) COMPROMISED DATA cybernetic-gi.com
  8. 8. 40 million Credit Cards. Target Dec, 2014 · 1-3 Million Credit Cards. · Sold for $27-$135 each. · $53.7 Million stolen before banks could block cards. COMPROMISED STOLEN TARGET: $10 Million to fraud victims. BANKS: $200 Million in card replacements COST cybernetic-gi.com
  9. 9. 750,000 Records Aussie Travel Cover Dec, 2014 · Travel Details · Policies · Personal Details (phone numbers, addresses) COMPROMISED DATA cybernetic-gi.com
  10. 10. WHAT ARE THE CURRENT TRENDS IN CYBER CRIME?
  11. 11. CYBERCRIME IS ON THE RISE Breaches increased by 23% in 2014. TRENDS IN CYBER CRIME SMALL TO MEDIUM BUSINESSES TARGETED In 2013, 60% of all attacks were focused on smaller organizations. CRIMINALS LOVE SOCIAL MEDIA 70% of social media scams in 2014 were manually shared by people to their friends cybernetic-gi.com
  12. 12. STEALTH ATTACKS It takes businesses on average 8 months before they realise they have been breached. TRENDS IN CYBER CRIME ATTACKS ARE LONGER 19% of companies experienced constant attacks (2014) - More than a 300% increase from 2013. ATTACKS ARE MORE TARGETED Companies admit that they can only successfully repel these attacks for 1 day or even less. cybernetic-gi.com
  13. 13. WHAT ARE COMMON CYBER ATTACKS?
  14. 14. SPEAR-PHISHING ATTACKS - Account for 91% of all emailing attacks . - Cybercriminals sent 14% fewer emails, to 20% less targets in 2014. - TREND: Sent via valid, but stolen corporate emailing accounts. TROJANIZED SOFTWARE Hackers hide their malware inside of software updates, and wait for the company to infect itself with the update. COMMON ATTACKS 2013-2015 RANSOMWARE Cybercriminals encrypt networks and computers and extorting money from the owners in exchange for the encryption key. - Increased by 113% in 2014. - COST: $300-$500 dollars. MOBILE MALWARE - 17% of all Android apps are disguised malware (Symantec, 2014). - Around 1 million apps on the market used to steal information such as mobile banking details and confidential emails. cybernetic-gi.com
  15. 15. WHY ARE LAW FIRMS A TARGET?
  16. 16. cybernetic-gi.com STEP ONE ATTACKS FROM WITH IN THE COMPANY LARGE VOLUME OF SENSITIVE INFORMATION TO UNCONCERNED WITH CYBER SAFETY INSUFFICIENT IT SECURITY WHY ARE YOU UNDER ATTACK?
  17. 17. HOW WILL IT IMPACT YOUR BUSINESS?
  18. 18. IMPACT ON YOUR BUSINESS WHAT IS THE PRICE OF POOR IT SECURITY? REVENUEPRODUCTIVITY REPUTATION If a cybercriminal gains access to your network, it will generate loss of productivity, compromise your data and possibly that of your clients, it will impact your company’s reputation, and could even result in law suits. cybernetic-gi.com
  19. 19. 19 - Mandatory Breach Reporting will soon be introduced by the Australia Government. - The new draft legislation will amend the Privacy Act to require companies to disclose to their clients if their data is compromised. - Increase regulation and financial burdens on organisations who do not report. MANDATORY DATA BREACH REPORTING cybernetic-gi.com
  20. 20. HOW CAN YOU PROTECT YOUR BUSINESS?
  21. 21. EASY STEPS YOU SHOULD TAKE THE DEVIL IS IN THE DETAILS… STRONGER PASSWORDS - The most over looked security measure. - Change passwords every 3-6 months - Delete old email accounts IT SECURITY POLICY - Educate everyone in your company on policy regarding password sharing, email attachments etc. FIRST RESPONSE PROCEDURE - Plan on how to deal with a network breach - Who do you call? - What systems do you take offline? - Educate all your staff UPDATE YOUR SOFTWARE - Regularly update your software and patch any vulnerabilities. cybernetic-gi.com
  22. 22. 22 - Determine the business value of IT assets. - Calculate cost from loss of those assets and the impact on business elements. - Assign recovery priorities to the assets. - Should complete annually. BUSINESS IMPACT AND RISK ASSESSMENT cybernetic-gi.com
  23. 23. 23 24/7/365 PROTECTION - Using Industry-leading tools, certified IT experts secure your information assets 24/7/365. - With live monitoring we can track spikes in your networks data stopping attacks before they occur. - Often at a fraction of the cost of in-house security resources. MANAGED SECURITY SERVICES cybernetic-gi.com
  24. 24. 24 - A real-life simulated attack conducted by a certified Ethical Hacker. - Provides a comprehensive assessment of your IT security. - Identify the weaknesses in your IT system and remove them before cybercriminals can gain access. PENETRATION TESTING cybernetic-gi.com
  25. 25. BEST PRACTICES Strong Passwords, Firewalls, Antivirus Software, Encyption. MANAGED SECURITY SERVICE Live defense against cyber criminals. Up-to-date system protection. PENETRATION TESTING Secure your IT Infrastructure by conducting a comprehensive test on its safety. Remove vulnerabilities before they can be exploited in real-life. CONCLUSION MANDATORY BREACH REPORTING News laws will penalise companies who do not report breaches in thier networks. RISK ASSESSMENT Have a clear understanding of your system and the devices that support it. Secure your end-points to prevent attacks from the inside. STAY SAFE It is always better to be proactive with your IT Security, so when the time comes, you don’t have to be reactive. cybernetic-gi.com
  26. 26. Our Office L 19, 1 Eagle St, Brisbane QLD, 4000 Our Phone 1300 292 376 Email contact@cybernetic-gi.com GET IN TOUCH WITH US OPEN WEEKDAYS 8am – 5:30pm Website www.cybernetic-gi.com

Hinweis der Redaktion

  • Drag Picture and Send to Back
  • Drag Picture and Send to Back
  • Drag Picture and Send to Back
  • Drag Picture and Send to Back
  • Drag Picture and Send to Back
  • Drag Picture and Send to Back
  • Drag Picture and Send to Back

×