SlideShare a Scribd company logo
1 of 11
Is Phishing A Threat?
The Total Number Of
Phishing Attacks Was
59% Higher In 2012
Than 2011.
Source: RSA Report On Phishing
And It’s Getting Worse
In 2012-2013, 37.3 million
users were subjected to
phishing attacks.
Up 87% from
2011-2012.
Source: Kaspersky Labs: Evolution of Phishing 2011-2013
Phishing is the most prevalent
web-borne attack, affecting
55% of companies.
Source: Kaspersky Labs: Evolution of Phishing 2011-2013
In the past 12 months, 91% of
companies surveyed had at
least one external IT security
incident
Source: Kaspersky Labs Report
Of Security Breaches
Involved Social Tactics
Source: 2013 Verizon Data Breach Investigations Report
Phishing Is The
Most Used
Social Tactic

71%
Source: 2013 Verizon Data Breach Investigations Report
Have you tested your
employees?
Our easy-to-use software allows any company to
conduct social engineering tests via phishing.

Free Trial

More Related Content

Viewers also liked

Casino Cheating Infographic
Casino Cheating InfographicCasino Cheating Infographic
Casino Cheating Infographic
Pokersitescom
 
Mendoza see 4099 ppt.
Mendoza see 4099 ppt.Mendoza see 4099 ppt.
Mendoza see 4099 ppt.
britttaa_
 
SARCO Services
SARCO ServicesSARCO Services
SARCO Services
Sunil Rao
 
Night Embrace- Sherrilyn Kenyon
Night Embrace- Sherrilyn KenyonNight Embrace- Sherrilyn Kenyon
Night Embrace- Sherrilyn Kenyon
Brizi Sue
 

Viewers also liked (20)

Mardi himal trekking
Mardi himal trekkingMardi himal trekking
Mardi himal trekking
 
Casino Cheating Infographic
Casino Cheating InfographicCasino Cheating Infographic
Casino Cheating Infographic
 
Imperative for Innovative entrepreneurship
Imperative for Innovative entrepreneurshipImperative for Innovative entrepreneurship
Imperative for Innovative entrepreneurship
 
Dt lab empathy syang8.2.13
Dt lab empathy syang8.2.13Dt lab empathy syang8.2.13
Dt lab empathy syang8.2.13
 
Double doods building loyalty
Double doods   building loyaltyDouble doods   building loyalty
Double doods building loyalty
 
Application
ApplicationApplication
Application
 
Agriculture policy approach_islambarbaruah
Agriculture policy approach_islambarbaruahAgriculture policy approach_islambarbaruah
Agriculture policy approach_islambarbaruah
 
Langtang valley trek
Langtang valley trek Langtang valley trek
Langtang valley trek
 
Mendoza see 4099 ppt.
Mendoza see 4099 ppt.Mendoza see 4099 ppt.
Mendoza see 4099 ppt.
 
Development intervention livestock sector_islambarbaruah
Development intervention livestock sector_islambarbaruahDevelopment intervention livestock sector_islambarbaruah
Development intervention livestock sector_islambarbaruah
 
Commercial horticulture_Northeast India_islam_barbaruah
Commercial horticulture_Northeast India_islam_barbaruahCommercial horticulture_Northeast India_islam_barbaruah
Commercial horticulture_Northeast India_islam_barbaruah
 
Readme
ReadmeReadme
Readme
 
EI Naptosa March 2014
EI Naptosa March 2014EI Naptosa March 2014
EI Naptosa March 2014
 
Industry associations and_entrepreneurship
Industry associations and_entrepreneurshipIndustry associations and_entrepreneurship
Industry associations and_entrepreneurship
 
Livestock development northeast_india
Livestock development northeast_indiaLivestock development northeast_india
Livestock development northeast_india
 
SARCO Services
SARCO ServicesSARCO Services
SARCO Services
 
Grade R NAPTOSA Leadership_Conference_2014
Grade R  NAPTOSA Leadership_Conference_2014Grade R  NAPTOSA Leadership_Conference_2014
Grade R NAPTOSA Leadership_Conference_2014
 
NOS for Veterinary Para-professionals in India
NOS for Veterinary Para-professionals in IndiaNOS for Veterinary Para-professionals in India
NOS for Veterinary Para-professionals in India
 
Night Embrace- Sherrilyn Kenyon
Night Embrace- Sherrilyn KenyonNight Embrace- Sherrilyn Kenyon
Night Embrace- Sherrilyn Kenyon
 
Ppt totkvk guwahati_barbaruah
Ppt totkvk guwahati_barbaruahPpt totkvk guwahati_barbaruah
Ppt totkvk guwahati_barbaruah
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Is Phishing A Threat?

  • 1. Is Phishing A Threat?
  • 2.
  • 3.
  • 4. The Total Number Of Phishing Attacks Was 59% Higher In 2012 Than 2011. Source: RSA Report On Phishing
  • 6. In 2012-2013, 37.3 million users were subjected to phishing attacks. Up 87% from 2011-2012. Source: Kaspersky Labs: Evolution of Phishing 2011-2013
  • 7. Phishing is the most prevalent web-borne attack, affecting 55% of companies. Source: Kaspersky Labs: Evolution of Phishing 2011-2013
  • 8. In the past 12 months, 91% of companies surveyed had at least one external IT security incident Source: Kaspersky Labs Report
  • 9. Of Security Breaches Involved Social Tactics Source: 2013 Verizon Data Breach Investigations Report
  • 10. Phishing Is The Most Used Social Tactic 71% Source: 2013 Verizon Data Breach Investigations Report
  • 11. Have you tested your employees? Our easy-to-use software allows any company to conduct social engineering tests via phishing. Free Trial