+ All Categories
Home > Documents > Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report,...

Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report,...

Date post: 28-Jul-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
22
Preventing Cyber Crime & Business Identity Theft Aaron Hanson Senior Manager, Regional Product Marketing, SMB & .cloud
Transcript
Page 1: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

Preventing Cyber Crime & Business Identity Theft

Aaron Hanson Senior Manager, Regional Product Marketing, SMB & .cloud

Page 2: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

We protect the world’s people and information.

Symantec Mission

Page 3: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

Threats stop business We stop threats

Page 4: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

Intelligence Feeds

Hosted Intelligence

Big Data Analytics

DeepSight

Analytics

Warehouse

Analysts

Probes in 200 countries & territories

Visibility into 30% of global email traffic

Over 2 million decoy accounts

Attack Quarantine System

Endpoints

Gateways

3rd Party Affiliates

Global Sensor Network

Global Intelligence Network

Global Data Collection

Honeypots

Powered by Security Intelligence

Page 5: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

⁻ 4,989 new vulnerabilities

⁻ 1.1 million identity exposed per breach

⁻ 4,595 Web attacks per day blocked

⁻ 403,000,000 unique malware variants vs. 286,000,000 in 2010

⁻ http://www.symantec.com/threatreport/ for more details.

Today’s Threat Landscape

12 new 0day vulnerabilities

14 new public SCADA vulnerabilities

321 browser plug-in vulnerabilities

4,501 new vulnerabilities

17,432 new bot C&C servers

30,000 domains hosting malware

59,526 phishing hosts

2,895,802 new AV signatures

6,798,338 bot infected computers

240,000,000 million new malware variants

5.5 billion attacks blocked by Symantec in 2011 (3 billion in 2010)

Page 6: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

A Whole Industry Exists To Help Malware Authors Evade Detection

Page 7: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

Bare Minimum Security No Longer an Option for SMBs

• Small businesses are increasingly being targeted

– Targeted attacks against SMBs doubled between 2011 and 2012.*

– Direct correlation between a rise in attacks against small companies and a drop in attacks against larger ones.

*Source: Symantec Intelligence Report, June 2012

Page 8: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

SMBs Are Weakest Link in Supply Chain

• Hackers use SMBs as stepping stone into larger companies

– 28 percent to 41 percent of data breaches caused by a third-party1

• Top 500 global businesses average 60 alliances each with smaller companies2

• Becoming the gateway to a major client’s or partner’s data can destroy an SMB

– Contracts now demanding partners have top-level security

1 Source: Ponemon 2011 Global Cost of a Data Breach

2 Source: House Small Business Committee

Page 9: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

No Cybersecurity Plans…No Worries

Nearly 3/4 of SMBs

– Indicate a safe Internet is important to success

– Say strong cybersecurity is good for their brand

However – over 6 out of 10 SMBs

– Say they are not concerned about cyber threats

– Don’t even have an informal internet security policy

AND the majority of SMBs surveyed (59%)

– Do not have a contingency plan to respond to a breach

Source: National Cyber Security Alliance & Symantec 2012 National Small Business Survey, October 2012

Page 10: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

Small Businesses Need:

Simple, Affordable, Automatic Protection That is Easy to Manage

Page 11: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

• Set up in minutes with Web-based management from anywhere

• No hardware, software, or specialized training needed

• One login to manage both backup and security in one easy-to-use console

Symantec Cloud Solutions Make Protection Simple

Start your free 30-day trial:

http://go.symantec.com/trycloud

Page 12: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

Symantec Web-Based Console Makes Management Easy

http://go.symantec.com/trycloud

Page 13: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

Simple, Fast, Effective Cloud-Managed Security

Page 14: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

Remote and Mobile Users Backup Exec.cloud Admin Anywhere

Deploy Manage Monitor

Main or Branch Office Symantec Data Centers

Automated, Continuous, Secure Online Backup & Recovery

Page 15: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

Automated, Continuous, Secure Online Backup & Recovery

Page 16: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

Steps you can take • Know what you need to protect

– Where is your information being stored and used

• Encrypt confidential information

• Use a Reliable Security Solution

– You need more than just Anti-virus

Page 17: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

Steps you can take • Map out a disaster preparedness

plan today

– Don’t wait until it’s too late

• Protect Information Completely

– Combine backup with robust security

• Stay up to date

– Security is only as good as the frequency with which it is updated

Page 18: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

18

Steps you can take • Educate employees

– About latest threats

– Spammer/Social media techniques

– Develop Internet security guidelines

– Enforce strong passwords: 8+ characters with letters, numbers, symbols

Page 19: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

Resources to Help You Get Started

• Internet Security Threat Report

• In-depth view of cyber threat landscape

• Understand how it affects you

• Learn to defend your business and employees

www.symantec.com/threatreport

Page 20: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

Resources to Help You Get Started

• Connect and join the conversation

www.symantec.com/connect

Page 22: Preventing Cyber Crime & Business Identity Theft€¦ · *Source: Symantec Intelligence Report, June 2012 . SMBs Are Weakest Link in Supply Chain •Hackers use SMBs as stepping stone

Thank you!

Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Aaron Hanson

[email protected]

Start your free 30-day trial: http://go.symantec.com/trycloud


Recommended