Cisco 2014 Annual Security Report

Post on 20-Aug-2015

13694 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

Transcript

1

Cisco 2014 Annual Security Report

#CiscoSecurity

2

The 2014 Cisco Annual Security Report highlights the most important security trends of the year and provides tips and guidance to keep enterprise technology environments more secure.

#CiscoSecurity

3

Cisco stays ahead of and shares the latest threats by using real-time threat intelligence from Cisco Security Intelligence Operations (SIO), and this year’s report also incorporates Sourcefire telemetry.

#CiscoSecurity

4

Cisco SIO is the world’s largest cloud-based security ecosystem, using more than 75 terabits of live data feeds from deployed Cisco email, web, firewall and intrusion prevention system (IPS) solutions.

#CiscoSecurity

5

Cisco 2014 Annual Security Report Highlights

#CiscoSecurity

6

Overall vulnerabilities and threats reached the highest level since initial tracking began in May 2000.

#CiscoSecurity

7

There is a shortage of more than a million security professionals across the globe in 2014.

#CiscoSecurity

8

100% of a sample of 30 of the world’s largest multinational company networks generated visitor traffic to Web sites that host malware.

#CiscoSecurity

9

Distributed Denial of Service (DDoS) attacks have increased in both volume and severity.

#CiscoSecurity

10

Multipurpose Trojans counted as the most frequently encountered web-delivered malware, at 27% of total encounters in 2013.

#CiscoSecurity

11

Java continues to be the most frequently exploited programming language targeted by online criminals.

#CiscoSecurity

12

99% of all mobile malware targeted Android devices.

#CiscoSecurity

13

In 2012 and 2013, there was remarkable growth in malware encounters for the agriculture and mining industry—formerly a relatively low-risk sector.

#CiscoSecurity

14

Reactions to the 2014 Cisco Annual Security Report

#CiscoSecurity

15

Instead of having healthy caution about offering access to networks and infrastructure, users are placing too much trust in the systems designed to protect them.

Source: David Roe, CSM Wire

#CiscoSecurity

16

In short, while defense tools are improving, the lack of skilled security professionals across all of the security practice areas is impacting organizations’ abilities to monitor and secure networks. Source: Peter Bernstein, TechZone360.

#CiscoSecurity

17

If technologies like cloud computing and the growth in the use of mobile technologies are creating a wider landscape for hackers to work on, then trust is the open door letting hackers into systems.

Source: David Roe, CSM Wire

#CiscoSecurity

18

New classes of devices and new infrastructure architectures offer attackers opportunities to exploit unanticipated weaknesses and inadequately defended assets.

Source: Peter Bernstein, TechZone360

#CiscoSecurity

19

99% of mobile malware is aimed at the Android operating system (OS), and 71% of all malicious websites target Google’s mobile OS. Source: Chris Merriman, The Inquirer

#CiscoSecurity

20

Cybercriminals have learned that harnessing the power of Internet infrastructure yields far more benefits than simply gaining access to individual computers or devices.

Source: CIOL Bureau

#CiscoSecurity

21

Distributed denial of service (DDoS) attacks- which disrupt traffic to and from targeted websites and can paralyze ISPs- have increased in both volume and severity.

Source: Peter Bernstein, TechZone360

#CiscoSecurity

22

By targeting Internet infrastructure, attackers undermine trust in everything connected to or enabled by it.

Source: CIOL Bureau

#CiscoSecurity

© 2011 Cisco and/or its affiliates. All rights reserved.

top related