SlideShare a Scribd company logo
1 of 42
Download to read offline
IT Manager’s Eyes Only
october 2016
TOP SEC
Multiple Intelligence reports have
identified significant, sinister threats
to global email communication networks
from coordinated underworld cyber
criminals. The threat is real and
substantial. Immediate action is
recommended to avoid catastrophe.
TOP SEC
Email remains the most common and
prevalent form of communication
in the business world.
RADICATI.COM
The total number of worldwide email
users, including both business and
consumers, is projected to go from
over 2.5 billion in 2014 to over 2.8
billion in 2018.
RADICATI.COM
Business users send and receive on average
121 emails a day in 2014 (projected to be 140
emails a day by 2018)
In 2014, the majority of email traffic came from
the business world, which accounts for over 108.7
billion emails sent and received per day.
By 2018, business email will account for over 139.4
billion emails sent and received per day.
By the end of 2018, worldwide mobile email users are
expected to total over 2.2 billion.
RADICATI.COM
The rapid expansion of email as the
single biggest primary
business communication channel has
fuelled a counter culture in
security threats and data breaches.
Spam, malware, ransomware and
phishing are all rising.
Think about your own company when you
view the following slides…
of employees access personal email from their business
computer, more than double the level of authorised use.
PINECOMPUTERS.NET
The average cost of a
data breach for large
enterprises is $429,000,
and 88% of companies have
experienced some degree
of data loss.
of employees receive
unencrypted, risky
corporate data via
email or attachment.
People send and receive
an average of 15 email
attachments every day
(over 5,000 attachments
per year).
THEAMERICANGENIUS.COM
SYMANTEC.COM
Cyber criminals targeted 5 out of 6 large companies
using email attacks in 2014 (an increase of 40%).
SME businesses also saw an uptick, with attacks
increasing 26% and 30% respectively.
unsolicited messages contain a
malicious attachment or link.
WWW2.TRUSTWAVE.COM
28% of breaches result from poor passwords, and
another 28% from weak remote access security.
WWW2.TRUSTWAVE.COM
39% of passwords are eight characters, a length
that takes an average of one day to crack.
(Compare that to 10-character passwords, which
take an average of 591 days.)WWW2.TRUSTWAVE.COM
increase in total cost
over 2013 levels.
In 2014, the average
cost of an enterprise
data breach reached
$3.79 million, a
WWW-01.IBM.COM
www.symantec.com
An increase of 317 million new
pieces of malware were created.
There are over 1.7 billion pieces
of malware currently in circulation
that could infect your inbox.
Non-targeted attacks of malware
increased by 26% in 2014.
WWW.SYMANTEC.COM
WW.SYMANTEC.COMWWW.SYMANTEC.COM
YOU CANNOT DEPEND ON VIRTUAL SANDBOXING
TO OBSERVE AND DETECT MALWARE.
Certain malware like W32.Crisis, upon detecting
a virtual machine, will search for other
virtual machine images and infect them.
In 2014, up to 28% of all malware
was ‘virtual machine aware’.
WWW.SYMANTEC.COM
There was a 4,000% increase in crypto-ransomware attacks.
Ransomware attacks grew 113% in 2014.
WWW.SYMANTEC.COM
WWW.SYMANTEC.COM
In 2013, crypto-ransomware
accounted for approximately
0.2 percent of all ransomware
attacks. By the end of 2014
this figure grgew to 4 percent
WWW.SYMANTEC.COM
GETCYBERSAFE.GC.CA
PHISHING ATTACKS COST GLOBAL ORGANISATIONS
$4.5 BILLION IN LOSSES IN 2014.
EMC.COM
from 2010 to 2014.
Phishing attacks rose by
EMC.COM
of people globally can’t correctly
identify a sophisticated phishing email.
securityaffairs.co
phishing.org
Spear phishing file type
breakdown analysis 2014
WWW.SYMANTEC.COM
Risk ratio of spear
phishing attacks by
industry
The mining industry
was the most heavily
targeted in 2014, with
43 percent (1 in 2.3)
of mining organizations
being targeted at least
once during the year.
WWW.SYMANTEC.COM
WWW.SYMANTEC.COM
Individuals in sales/
marketing job roles
were the most targeted
in 2014, with 1 in 2.9
of them being targeted
at least once; this
is equivalent to 35%
of sales/marketing
personnel
Cybercriminals rely on an underground
online economy to buy and sell
services and malware and to fence stolen
credit cards and botnets.
CYBERCRIME HAS A 1,425%
RETURN ON INVESTMENT.
WWW.SYMANTEC.COM
45% of businesses have board or senior level
management who take only a partial role in security
matters. 9% do not partake at all.
IN MANY CASES, THE IT MANAGER MUST TAKE FULL
RESPONSIBILITY ON THEIR OWN.
trustwave.com
In 2013, 4 out of 5 IT professionals were pressured
to rollout IT projects despite security issues.
forbes.com
of decision makers are facing
pressure to release IT projects that
are not security ready.
TRUSTWAVE.COM
Defend against email threats.
Deploy an email security service,
with multiple safeguards including
anti-spam, anti-malware and content
filtering capabilities.
Secure email traffic content.
Block or flag all executable files
and all suspicious orunusual file
attachments, such as .cpl, .chm and
.lnk files. Create alternative
methods for file sharing.
Ensure email security service
can handle blended threats that
combine spam with links to
malicious websites.
Educate users, from the bottom ranks
all the way up to the C-suite, on
the nature of today’s email attacks
and conduct mock phishing exercises.
Consider upgrading your IT
email defences with Blockmail.
1.
2.
3.
4.
5.
50-56 Merrion Road Road,
Ballsbridge, Dublin 4. D04 V4K3, Ireland.
Telephone: +353 (0)1 426 3300
Fax: + 353 (0)1 466 0687
Topsec UK
Castle Hill House
12 Castle Hill, Windsor, SL4 1PD, United Kingdom
Telephone: + 44 (1784)725903
Topsec Canada
Suite 830, 5991 Spring Garden Road
Halifax, B3H 1Y6, Nova Scotia
Telephone: + 1 902 430 9340
Email:
For sales enquiries: sales@topsec.com For support
enquiries: support@topsec.com For DNS enquiries:
dns@topsec.com
DISCOVER MORE ABOUT HOW TO
COMBAT MALWARE AND SPAM WITH
OUR FREE EBOOK DOWNLOAD.
START YOUR FREE TRIAL TODAY
produced by
DOWNLOAD HERE

More Related Content

What's hot

5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public SectorSeqrite
 
Proofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSPaul Walsh
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustrySeqrite
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Entersoft Security
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...Symantec
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security DeploymentCisco Canada
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftIntellias
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss PreventionSeqrite
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based AttacksESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based AttacksProofpoint
 
Infographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threatsInfographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threatsProofpoint
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?Samvel Gevorgyan
 

What's hot (20)

5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
Proofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat Report
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMS
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security Deployment
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
Security/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and ComplianceSecurity/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and Compliance
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based AttacksESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Infographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threatsInfographic - Three steps to stopping advanced email threats
Infographic - Three steps to stopping advanced email threats
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 

Similar to Topsec email security 2016

Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce websiteDr. Raghavendra GS
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar SessionKalilur Rahman
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessIndusfacePvtLtd
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enAndrey Apuhtin
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfkirtigoyal328
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 
Internet security threat report 2013
Internet security threat report 2013Internet security threat report 2013
Internet security threat report 2013Karim Shaikh
 
Datto stateofthechannelransomwarereport2016 rh
Datto stateofthechannelransomwarereport2016 rhDatto stateofthechannelransomwarereport2016 rh
Datto stateofthechannelransomwarereport2016 rhJames Herold
 
What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?MaryJWilliams2
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryCR Group
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationMaaz Ahmed Shaikh
 

Similar to Topsec email security 2016 (20)

Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your Business
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-en
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
Internet security threat report 2013
Internet security threat report 2013Internet security threat report 2013
Internet security threat report 2013
 
Datto stateofthechannelransomwarereport2016 rh
Datto stateofthechannelransomwarereport2016 rhDatto stateofthechannelransomwarereport2016 rh
Datto stateofthechannelransomwarereport2016 rh
 
What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
 
B istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-usB istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-us
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
 

Recently uploaded

Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 

Recently uploaded (20)

Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 

Topsec email security 2016

  • 1. IT Manager’s Eyes Only october 2016 TOP SEC
  • 2. Multiple Intelligence reports have identified significant, sinister threats to global email communication networks from coordinated underworld cyber criminals. The threat is real and substantial. Immediate action is recommended to avoid catastrophe. TOP SEC
  • 3. Email remains the most common and prevalent form of communication in the business world. RADICATI.COM
  • 4. The total number of worldwide email users, including both business and consumers, is projected to go from over 2.5 billion in 2014 to over 2.8 billion in 2018. RADICATI.COM
  • 5. Business users send and receive on average 121 emails a day in 2014 (projected to be 140 emails a day by 2018) In 2014, the majority of email traffic came from the business world, which accounts for over 108.7 billion emails sent and received per day. By 2018, business email will account for over 139.4 billion emails sent and received per day. By the end of 2018, worldwide mobile email users are expected to total over 2.2 billion. RADICATI.COM
  • 6. The rapid expansion of email as the single biggest primary business communication channel has fuelled a counter culture in security threats and data breaches.
  • 7. Spam, malware, ransomware and phishing are all rising.
  • 8. Think about your own company when you view the following slides…
  • 9. of employees access personal email from their business computer, more than double the level of authorised use. PINECOMPUTERS.NET
  • 10. The average cost of a data breach for large enterprises is $429,000, and 88% of companies have experienced some degree of data loss. of employees receive unencrypted, risky corporate data via email or attachment. People send and receive an average of 15 email attachments every day (over 5,000 attachments per year). THEAMERICANGENIUS.COM
  • 11. SYMANTEC.COM Cyber criminals targeted 5 out of 6 large companies using email attacks in 2014 (an increase of 40%). SME businesses also saw an uptick, with attacks increasing 26% and 30% respectively.
  • 12. unsolicited messages contain a malicious attachment or link. WWW2.TRUSTWAVE.COM
  • 13. 28% of breaches result from poor passwords, and another 28% from weak remote access security. WWW2.TRUSTWAVE.COM
  • 14. 39% of passwords are eight characters, a length that takes an average of one day to crack. (Compare that to 10-character passwords, which take an average of 591 days.)WWW2.TRUSTWAVE.COM
  • 15. increase in total cost over 2013 levels. In 2014, the average cost of an enterprise data breach reached $3.79 million, a WWW-01.IBM.COM
  • 17.
  • 18. An increase of 317 million new pieces of malware were created. There are over 1.7 billion pieces of malware currently in circulation that could infect your inbox. Non-targeted attacks of malware increased by 26% in 2014. WWW.SYMANTEC.COM
  • 20. YOU CANNOT DEPEND ON VIRTUAL SANDBOXING TO OBSERVE AND DETECT MALWARE. Certain malware like W32.Crisis, upon detecting a virtual machine, will search for other virtual machine images and infect them. In 2014, up to 28% of all malware was ‘virtual machine aware’. WWW.SYMANTEC.COM
  • 21.
  • 22. There was a 4,000% increase in crypto-ransomware attacks. Ransomware attacks grew 113% in 2014. WWW.SYMANTEC.COM
  • 24. In 2013, crypto-ransomware accounted for approximately 0.2 percent of all ransomware attacks. By the end of 2014 this figure grgew to 4 percent WWW.SYMANTEC.COM
  • 25.
  • 27. PHISHING ATTACKS COST GLOBAL ORGANISATIONS $4.5 BILLION IN LOSSES IN 2014. EMC.COM
  • 28. from 2010 to 2014. Phishing attacks rose by EMC.COM
  • 29. of people globally can’t correctly identify a sophisticated phishing email. securityaffairs.co
  • 31.
  • 32. Spear phishing file type breakdown analysis 2014 WWW.SYMANTEC.COM
  • 33. Risk ratio of spear phishing attacks by industry The mining industry was the most heavily targeted in 2014, with 43 percent (1 in 2.3) of mining organizations being targeted at least once during the year. WWW.SYMANTEC.COM
  • 34. WWW.SYMANTEC.COM Individuals in sales/ marketing job roles were the most targeted in 2014, with 1 in 2.9 of them being targeted at least once; this is equivalent to 35% of sales/marketing personnel
  • 35. Cybercriminals rely on an underground online economy to buy and sell services and malware and to fence stolen credit cards and botnets. CYBERCRIME HAS A 1,425% RETURN ON INVESTMENT.
  • 37.
  • 38. 45% of businesses have board or senior level management who take only a partial role in security matters. 9% do not partake at all. IN MANY CASES, THE IT MANAGER MUST TAKE FULL RESPONSIBILITY ON THEIR OWN. trustwave.com
  • 39. In 2013, 4 out of 5 IT professionals were pressured to rollout IT projects despite security issues. forbes.com
  • 40. of decision makers are facing pressure to release IT projects that are not security ready. TRUSTWAVE.COM
  • 41. Defend against email threats. Deploy an email security service, with multiple safeguards including anti-spam, anti-malware and content filtering capabilities. Secure email traffic content. Block or flag all executable files and all suspicious orunusual file attachments, such as .cpl, .chm and .lnk files. Create alternative methods for file sharing. Ensure email security service can handle blended threats that combine spam with links to malicious websites. Educate users, from the bottom ranks all the way up to the C-suite, on the nature of today’s email attacks and conduct mock phishing exercises. Consider upgrading your IT email defences with Blockmail. 1. 2. 3. 4. 5.
  • 42. 50-56 Merrion Road Road, Ballsbridge, Dublin 4. D04 V4K3, Ireland. Telephone: +353 (0)1 426 3300 Fax: + 353 (0)1 466 0687 Topsec UK Castle Hill House 12 Castle Hill, Windsor, SL4 1PD, United Kingdom Telephone: + 44 (1784)725903 Topsec Canada Suite 830, 5991 Spring Garden Road Halifax, B3H 1Y6, Nova Scotia Telephone: + 1 902 430 9340 Email: For sales enquiries: sales@topsec.com For support enquiries: support@topsec.com For DNS enquiries: dns@topsec.com DISCOVER MORE ABOUT HOW TO COMBAT MALWARE AND SPAM WITH OUR FREE EBOOK DOWNLOAD. START YOUR FREE TRIAL TODAY produced by DOWNLOAD HERE