average annual cost of cybercrime facing businesses Number of records stolen The Cyber Security Council's 5 most effective solutions for dealing with cyber threat: Reduce number of users with administrative privileges Patch system and application software within 48 hours Patch system software within within 48 hours Use of standard, secure system configurations Application whitelisting App control is the # 1 strategy for overcoming real world attacks (Australian DoD) Password protection Antivirus software 90 % of passwords are vulnerable to hacking Top 5 common passwords of 2013 92 % of organizations say up to date antivirus software is in use today... ... yet only 34 % rate it as highly effective in preventing cyber intrusions Firewalls 88 % say a perimeter firewall is in use today... ...the remaining 12 % have plans to implement one 34 % of an organization’s total time on IT security issues is dedicated to managing user profiles ... 92 % of critical Microsoft vulnerabilities would be mitigated by removing admin rights 100 % of Internet Explorer vulnerabilities would be mitigated by removing admin rights. @ Phishing 53 % Rogue software /downloads 60 % Target Unpatched vulnerabilities 74 % Targeted attacks (APTs) 77 % $7m = of companies are either not prepared or only minimally prepared to deal with attacks 52 % Yet is dedicated to securing the endpoint... 48 % ...while say that securing the endpoint is difficult to achieve 81 % ...yet increase in the number of data breaches in 2013 62 % There was a Over 288,000 new cyber threats are reported every day – that’s 3 per second US Military Veterans LivingSocial Adobe 110 Million 70 Million 50 Million 38 Million Man in the middle attacks 38 % + + -- = $ 7 , 000 , 000 1. 123456 2. password 3. 12345678 4. qwerty 5. abc123 UPDATE 0 1 EASY 1 0 0 1 0 1 0 1 0 0 1 0 1 1 0 0 0 0 1 1 0 1 0 1 1 0 0 6th of never 1 0 1 0 1 0 0 1 0 1 1 0 0 0 0 1 0 1 1 0 0 0 0 1 1 0 1 0 1 1 0 0 1 0 1 0 1 0 0 1 0 1 1 0 0 0 0 1 0 1 1 0 0 0 0 1 1 0 1 0 1 1 0 0 1 0 1 0 1 0 0 1 1 0 0 0 0 1 1 0 0 0 1 0 1 0 1 1 1 0 1 0 1 0 0 1 1 0 0 0 0 1 1 0 0 0 1 0 1 0 1 1 1 0 1 0 1 0 0 1 0 1 1 0 0 0 0 1 1 0 1 0 1 0 0 1 1 0 0 0 A Are businesses today doing enough to succeed in the battle against cyber security threats and are the traditional methods they are using the most effective? Overcoming Cyber Attacks Avecto @avecto Avecto avecto.com [email protected] Sources Infosec Security Survey: conducted by Avecto at InfoSec 2014. The Internet Society: http://www.internetsociety.org/history?gclid=CLyb45al-b0CFcHn wgodhIMAxwhttp: //www.personal.psu.edu/users/j/m/jms6423/Engproj/History%20of%20Computer%20Crime.xhtml Computer Hope: http://www.computerhope.com/history/internet.htm Heartbleed.com: http://heartbleed.com/ Microsoft: http://research.microsoft.com/en-us/um/people/mbj/Smiley/smiley.html About.com: http://email.about.com/od/emailtrivia/f/first_spam.htm Internet World Stats: http://www.internetworldstats.com/emarketing.htm LiveScience: http://www.livescience.com/20727-internet-history.html Wikipedia: http://en.wikipedia.org/wiki/Timeline_of_computer_viruses_and_worms http://www.nytimes.com/2014/02/09/us/snowden-used-low-cost-tool-to-best-nsa.html?hp&_r=2 Pew Research Internet Project: http://www.pewinternet.org/2014/03/11/world-wide-web-timeline/ UK Hobart House Cheadle Royal Business Park Cheadle, Cheshire, SK8 3SR Phone +44 (0)845 519 0114 Fax +44 (0)845 519 0115 Americas 125 Cambridge Park Drive Suite 301, Cambridge, MA 02140, USA Phone 978 703 4169 Fax 978 910 0448 Australia Level 8 350 Collins Street, Melbourne, Victoria 3000, Australia Phone +613 8605 4822 Fax +613 8601 1180 Are you protected? Cyber challenges facing today’s businesses Major real life data breaches in 2013/14 Effectiveness of traditional security solutions Proactive defense in depth Security Infographic