paid in ransom by companies in Q1 $209 Million NEW families of ransomware 62 ransomware modifications by end of Q3 54,000 Ransomware Attacks Daily Don’t Let Your Device Become a Hostage R a n S W a r E O m With the advancements of internet and technology, it is now a digital world. Our most vital and confidential information is aggregated to our computers and devices. This has become an extremely lucrative resource for hackers by employing ransomware, targeting end users and companies. Sources: Federal Bureau of Investigation: "Ransomware Prevention and Response for CISOs" Kaspersky Security Bulletin Statistics 2016 Powered by Zyxel USG Learn more at http://onesecurity.zyxel.com/ Opening Suspicious Email Attachments Malicious Web Links Clicking on Malicious Advertisements Installing Software Install Anti-Spam Software Content Filter Install Anti-Virus Instusion Detection and Protection System (IDP) Methods of Intrusion 1 2 3 4 WARNING PROCEED WITH CAUTION PREVENT Don’t React 1 2 3 4 1,000 2015 4,000 2016