Top Banner
A BUSINESS / MARKETING PRESENTATION
26
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Current Trends in Cyber Crime 2015

A BUSINESS / MARKETING PRESENTATION

Page 2: Current Trends in Cyber Crime 2015

WHAT IS CYBERCRIME?

Page 3: Current Trends in Cyber Crime 2015

Australian Cyber Crime Act 2001

…an illegal activity carried out against computer data and systems..The broader definition also includes “computer-related offences, as well as content and copyright infractions”.

WHAT IS CYBERCRIME?

cybernetic-gi.com

Page 4: Current Trends in Cyber Crime 2015

VIDEO

https://www.youtube.com/watch?v=l_XOrcBxy-E

Page 5: Current Trends in Cyber Crime 2015

Australian Cyber Crime Act 2001

…an illegal activity carried out against computer data and systems..The broader definition also includes “computer-related offences, as well as content and copyright infractions”.

WHAT IS CYBERCRIME?

cybernetic-gi.com

Page 6: Current Trends in Cyber Crime 2015

ROBERT MUELLER – FBI Director, 2012

There are only two types of companies: those that have been hacked, and those that will be.

“ “ cybernetic-gi.com

Page 7: Current Trends in Cyber Crime 2015

76 million households&

7 million businesses

JPMorgan Chase2014

· Credit Card Details· Financial Records· Personal Details (phone numbers, addresses)

COMPROMISED

DATA

cybernetic-gi.com

Page 8: Current Trends in Cyber Crime 2015

40 million Credit Cards.

TargetDec, 2014

· 1-3 Million Credit Cards.· Sold for $27-$135 each.· $53.7 Million stolen before banks could block cards.

COMPROMISED

STOLEN

TARGET: $10 Million to fraud victims.BANKS: $200 Million in card replacements

COST

cybernetic-gi.com

Page 9: Current Trends in Cyber Crime 2015

750,000 Records

Aussie Travel CoverDec, 2014

· Travel Details· Policies· Personal Details (phone numbers, addresses)

COMPROMISED

DATA

cybernetic-gi.com

Page 10: Current Trends in Cyber Crime 2015

WHAT ARE THE CURRENT TRENDS IN CYBER CRIME?

Page 11: Current Trends in Cyber Crime 2015

CYBERCRIME IS ON THE RISE

Breaches increased by 23% in 2014.

TRENDS IN CYBER CRIME

SMALL TO MEDIUM BUSINESSES TARGETED

In 2013, 60% of all attacks were focused

on smaller organizations.

CRIMINALS LOVE SOCIAL MEDIA

70% of social media scams in 2014 were manually shared by

people to their friends

cybernetic-gi.com

Page 12: Current Trends in Cyber Crime 2015

STEALTH ATTACKS

It takes businesses on average 8 months before

they realise they have been breached.

TRENDS IN CYBER CRIME

ATTACKS ARE LONGER

19% of companies experienced constant

attacks (2014) - More than a 300% increase from

2013.

ATTACKS ARE MORE TARGETED

Companies admit that they can only successfully repel these attacks for 1 day or

even less.

cybernetic-gi.com

Page 13: Current Trends in Cyber Crime 2015

WHAT ARE COMMON CYBER ATTACKS?

Page 14: Current Trends in Cyber Crime 2015

SPEAR-PHISHING ATTACKS

- Account for 91% of all emailing attacks .

- Cybercriminals sent 14% fewer emails, to 20% less targets in

2014.

- TREND: Sent via valid, but stolen corporate emailing

accounts.

TROJANIZED SOFTWARE

Hackers hide their malware inside of software updates, and

wait for the company to infect itself with the update.

COMMON ATTACKS2013-2015

RANSOMWARE

Cybercriminals encrypt networks and computers and

extorting money from the owners in exchange for the

encryption key.

- Increased by 113% in 2014.

- COST: $300-$500 dollars.

MOBILE MALWARE

- 17% of all Android apps are disguised malware (Symantec,

2014).

- Around 1 million apps on the market used to steal

information such as mobile banking details and confidential

emails.

cybernetic-gi.com

Page 15: Current Trends in Cyber Crime 2015

WHY ARE LAW FIRMS A TARGET?

Page 16: Current Trends in Cyber Crime 2015

cybernetic-gi.com

STEP ONE

ATTACKS FROM WITH IN THE

COMPANY

LARGE VOLUME OF SENSITIVE

INFORMATION

TO UNCONCERNED WITH CYBER

SAFETY

INSUFFICIENT IT SECURITY

WHY ARE YOU UNDER ATTACK?

Page 17: Current Trends in Cyber Crime 2015

HOW WILL IT IMPACT YOUR BUSINESS?

Page 18: Current Trends in Cyber Crime 2015

IMPACT ON YOUR BUSINESSWHAT IS THE PRICE OF POOR IT SECURITY?

REVENUEPRODUCTIVITY REPUTATION

If a cybercriminal gains access to your network, it will generate loss of productivity, compromise your data and possibly that of your clients, it will impact your company’s reputation, and could even result in law suits.

cybernetic-gi.com

Page 19: Current Trends in Cyber Crime 2015

19

- Mandatory Breach Reporting will soon be

introduced by the Australia Government. - The new draft legislation will amend the

Privacy Act to require companies to disclose to

their clients if their data is compromised.- Increase regulation and financial burdens on

organisations who do not report.

MANDATORY DATA BREACH REPORTING

cybernetic-gi.com

Page 20: Current Trends in Cyber Crime 2015

HOW CAN YOU PROTECT YOUR BUSINESS?

Page 21: Current Trends in Cyber Crime 2015

EASY STEPS YOU SHOULD TAKETHE DEVIL IS IN THE DETAILS…

STRONGER PASSWORDS- The most over looked security measure.- Change passwords every 3-6 months- Delete old email accounts

IT SECURITY POLICY- Educate everyone in your company on policy regarding password sharing, email attachments etc.

FIRST RESPONSE PROCEDURE- Plan on how to deal with a network breach- Who do you call? - What systems do you take offline?- Educate all your staff

UPDATE YOUR SOFTWARE- Regularly update your software and patch any vulnerabilities.

cybernetic-gi.com

Page 22: Current Trends in Cyber Crime 2015

22

- Determine the business value of IT assets.

- Calculate cost from loss of those assets and

the impact on business elements.

- Assign recovery priorities to the assets.

- Should complete annually.

BUSINESS IMPACT AND RISK ASSESSMENT

cybernetic-gi.com

Page 23: Current Trends in Cyber Crime 2015

23

24/7/365 PROTECTION- Using Industry-leading tools, certified IT experts secure

your information assets 24/7/365.- With live monitoring we can track spikes in your networks

data stopping attacks before they occur. - Often at a fraction of the cost of in-house security

resources.

MANAGED SECURITY SERVICES

cybernetic-gi.com

Page 24: Current Trends in Cyber Crime 2015

24

- A real-life simulated attack conducted by a

certified Ethical Hacker.- Provides a comprehensive assessment of your

IT security.- Identify the weaknesses in your IT system and

remove them before cybercriminals can gain

access.

PENETRATION TESTING

cybernetic-gi.com

Page 25: Current Trends in Cyber Crime 2015

BEST PRACTICES

Strong Passwords, Firewalls, Antivirus Software, Encyption.

MANAGED SECURITY SERVICE

Live defense against cyber criminals. Up-to-date system protection.

PENETRATION TESTING

Secure your IT Infrastructure by conducting a comprehensive test on its safety. Remove vulnerabilities before they can be exploited in real-life.

CONCLUSION

MANDATORY BREACH REPORTINGNews laws will penalise companies who do not report breaches in thier networks.

RISK ASSESSMENT

Have a clear understanding of your system and the devices that support it. Secure your end-points to prevent attacks from the inside.

STAY SAFE

It is always better to be proactive with your IT Security, so when the time comes, you don’t have to be reactive.

cybernetic-gi.com

Page 26: Current Trends in Cyber Crime 2015

Our OfficeL 19, 1 Eagle St, Brisbane QLD, 4000

Our Phone1300 292 376

[email protected]

GET IN TOUCH WITH USOPEN WEEKDAYS 8am – 5:30pm

Websitewww.cybernetic-gi.com