1 Cisco 2014 Annual Security Report #CiscoSecuri ty
1
Cisco 2014 Annual Security Report
#CiscoSecurity
2
The 2014 Cisco Annual Security Report highlights the most important security trends of the year and provides tips and guidance to keep enterprise technology environments more secure.
#CiscoSecurity
3
Cisco stays ahead of and shares the latest threats by using real-time threat intelligence from Cisco Security Intelligence Operations (SIO), and this year’s report also incorporates Sourcefire telemetry.
#CiscoSecurity
4
Cisco SIO is the world’s largest cloud-based security ecosystem, using more than 75 terabits of live data feeds from deployed Cisco email, web, firewall and intrusion prevention system (IPS) solutions.
#CiscoSecurity
5
Cisco 2014 Annual Security Report Highlights
#CiscoSecurity
6
Overall vulnerabilities and threats reached the highest level since initial tracking began in May 2000.
#CiscoSecurity
7
There is a shortage of more than a million security professionals across the globe in 2014.
#CiscoSecurity
8
100% of a sample of 30 of the world’s largest multinational company networks generated visitor traffic to Web sites that host malware.
#CiscoSecurity
9
Distributed Denial of Service (DDoS) attacks have increased in both volume and severity.
#CiscoSecurity
10
Multipurpose Trojans counted as the most frequently encountered web-delivered malware, at 27% of total encounters in 2013.
#CiscoSecurity
11
Java continues to be the most frequently exploited programming language targeted by online criminals.
#CiscoSecurity
12
99% of all mobile malware targeted Android devices.
#CiscoSecurity
13
In 2012 and 2013, there was remarkable growth in malware encounters for the agriculture and mining industry—formerly a relatively low-risk sector.
#CiscoSecurity
14
Reactions to the 2014 Cisco Annual Security Report
#CiscoSecurity
15
Instead of having healthy caution about offering access to networks and infrastructure, users are placing too much trust in the systems designed to protect them.
Source: David Roe, CSM Wire
#CiscoSecurity
16
In short, while defense tools are improving, the lack of skilled security professionals across all of the security practice areas is impacting organizations’ abilities to monitor and secure networks. Source: Peter Bernstein, TechZone360.
#CiscoSecurity
17
If technologies like cloud computing and the growth in the use of mobile technologies are creating a wider landscape for hackers to work on, then trust is the open door letting hackers into systems.
Source: David Roe, CSM Wire
#CiscoSecurity
18
New classes of devices and new infrastructure architectures offer attackers opportunities to exploit unanticipated weaknesses and inadequately defended assets.
Source: Peter Bernstein, TechZone360
#CiscoSecurity
19
99% of mobile malware is aimed at the Android operating system (OS), and 71% of all malicious websites target Google’s mobile OS. Source: Chris Merriman, The Inquirer
#CiscoSecurity
20
Cybercriminals have learned that harnessing the power of Internet infrastructure yields far more benefits than simply gaining access to individual computers or devices.
Source: CIOL Bureau
#CiscoSecurity
21
Distributed denial of service (DDoS) attacks- which disrupt traffic to and from targeted websites and can paralyze ISPs- have increased in both volume and severity.
Source: Peter Bernstein, TechZone360
#CiscoSecurity
22
By targeting Internet infrastructure, attackers undermine trust in everything connected to or enabled by it.
Source: CIOL Bureau
#CiscoSecurity
23
Download to learn more:
Cisco 2014 Annual Security Report
#CiscoSecurity
24
Find out how to align your IT strategy with the future
Go ExecutivePerspectives
#CiscoSecurity
@CiscoSecurity
© 2011 Cisco and/or its affiliates. All rights reserved.