+ All Categories
Home > Documents > YOUR BUSINESS CUSTOMERS - SecurityCoverage · were identified in 2016, of which, over 500 were...

YOUR BUSINESS CUSTOMERS - SecurityCoverage · were identified in 2016, of which, over 500 were...

Date post: 30-Jun-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
1
Understanding How cybersecurity threats are effecting your business customers and what they can do to combat it. SMALL BUSINESS CYBERSECURITY YOUR BUSINESS CUSTOMERS 74 % 1 2 3 of companies who experienced a cybersecurity breach in last 12 months don’t know how it happened. 1 of security professionals said their organization was the victim of a ransomware attack in 2016. 2 of IT experts believe their organization isn’t prepared for IoT-related threats. 8 61 % 70 % SecurityCoverage Solution SecureIT Pro protects virtual server environments from threats. IoT Devices SecurityCoverage Solution SecureIT Pro personal firewall protects computers and phones from back doors created by IoT vulnerabilities. 46% of businesses said they knew their organization had sustained an attack that resulted from unsecure IoT applications.4 Wireless Networks SecurityCoverage Solution Tech Office Prime and TotalTech Professional include a Wi-Fi support component that can educate and troubleshoot business Wi-Fi. 50% of people/businesses use a router that is over 12 years old, opening them up to threats and significant slowdown. 5 Passwords SecurityCoverage Solution Tech Office includes a password manager with 256-bit AES encryption and a built-in password generator. 46% of employee passwords are crackable within 6 hours. 3 USB Drives SecurityCoverage Solution SecureIT Pro protects against malware and virus threats commonly present on a USB drive. 25% of malware is spread through USB devices.6 File Storage Mobile Devices SecurityCoverage Solution Tech Office mobile solutions keep your mobile devices protected with web security, password management and backup. SecurityCoverage Solution Tech Office includes multiple backup options to make sure your company is ready for catastrophic data loss. 140,000 hard drives crash each week. 35% of IT specialists report that their companies have lost data due to malware.7 Trash Can SecurityCoverage Advice Switch trash cans while they aren’t looking. 100% chance of being filled with co-workers lunch leftovers. Plant Life SecurityCoverage Advice If you can confirm plant life is not plastic, make sure it gets plenty of sun and water. Rare in office settings. Some employees are unfamiliar with these organic items. Virtual Servers Over 60% of IT decision makers cite malware infections as their highest concern related to their data center or cloud infrastructure. 9 Almost 700 mobile vulnerabilities were identified in 2016, of which, over 500 were related to Android (over 400% increase from 2015). 10 Presented by: 6060 Huntington Court NE Cedar Rapids, IA 52402 www.securitycoverage.com The average employee spends 91 hours per year sorting out various technology problems. Tech Office provides your business customers with business security, cloud backup, password management and tech support for their office devices. Let us handle these office technology challenges so employees can get back to work. Businesses are increasingly vulnerable to cybersecurity threats targeting computers, servers and mobile devices. With SecureIT Pro, your business customers gain industry-leading protection from viruses, spyware, ransomware and phishing. From small to large offices, our techs will help with setup and support so business security remains at peak performance. Technology-related decreases in productivity at the office represents a significant monetary impact to your business customers. Available as a one-time service or subscription, our Midwest-based TotalTech Professional technicians are available 24|7|365 via chat, web or phone to remotely diagnose and resolve virtually any business technology issue. 1. Bitdefender Business Insights - https://businessinsights.bitdefender.com/us-cisos-companies-suffered-breach 2. Cyberedge Group - https://cyber-edge.com/cdr/ 3. Entrepeneur - https://www.entrepreneur.com/article/242208 4. Security Intelligence - https://securityintelligence.com/10-key-findings-from-the-ponemon-institutes-mobile-iot-application-security-testing-study/ 5. Linksys - http://cache-www.linksys.com/resources/img/features/ea8500/Belkin_Linksys_FD_of_Networking_InfoBrief.pdf 6. US-CERT - https://www.us-cert.gov/sites/default/files/publications/RisksOfPortableDevices.pdf 7. Novastor - http://novabackup.novastor.com/blog/top-6-data-loss-causes-and-top-10-preventions/ 8. Tripwire - https://www.tripwire.com/company/research/black-hat-2016-survey-iot-risks-and-cyber-war/ 9. SANS Institute - https://www.sans.org/reading-room/whitepapers/analyst/state-dynamic-data-center-cloud-security-modern-enterprise-36312 10. Skycure - https://www.skycure.com/blog/mobile-threats-year-in-review/ ® SOURCES Learn More About Our Business Solutions! Call - 1-877-725-4839
Transcript
Page 1: YOUR BUSINESS CUSTOMERS - SecurityCoverage · were identified in 2016, of which, over 500 were related to Android (over 400% increase from 2015).10 Presented by: 6060 Huntington

Understanding

How cybersecurity threatsare e�ecting your businesscustomers and what they can do to combat it.

SMALL BUSINESS CYBERSECURITY

YOUR BUSINESS CUSTOMERS

74%

1 2 3

of companies who experienced a cybersecurity

breach in last 12 months don’tknow how it happened.1

of security professionalssaid their organization

was the victim of aransomware attack

in 2016.2

of IT experts believetheir organization isn’t

prepared for IoT-relatedthreats.8

61% 70%

SecurityCoverage SolutionSecureIT Pro protects virtual server environments from threats.

IoT Devices

SecurityCoverage SolutionSecureIT Pro personal firewall protectscomputers and phones from back doorscreated by IoT vulnerabilities.

46% of businesses said theyknew their organization hadsustained an attack that resultedfrom unsecure IoT applications.4

Wireless Networks

SecurityCoverage SolutionTech O�ce Prime and TotalTech Professional include a Wi-Fi support component that can educate and troubleshoot business Wi-Fi.

50% of people/businesses use a router that is over 12 years old,opening them up to threats andsignificant slowdown. 5

Passwords

SecurityCoverage SolutionTech O�ce includes a password managerwith 256-bit AES encryption and a built-inpassword generator.

46% of employee passwordsare crackable within 6 hours.3

USB Drives

SecurityCoverage SolutionSecureIT Pro protects against malware andvirus threats commonly present on aUSB drive.

25% of malware is spreadthrough USB devices.6

File Storage

Mobile Devices

SecurityCoverage SolutionTech O�ce mobile solutions keep yourmobile devices protected with web security,password management and backup.

SecurityCoverage SolutionTech O�ce includes multiple backupoptions to make sure your company isready for catastrophic data loss.

140,000 hard drives crash eachweek. 35% of IT specialistsreport that their companies havelost data due to malware.7

Trash Can

SecurityCoverage AdviceSwitch trash cans while they aren’t looking.

100% chance of being filledwith co-workers lunchleftovers.

Plant Life

SecurityCoverage AdviceIf you can confirm plant life is not plastic, make sure it gets plenty of sun and water.

Rare in o�ce settings. Someemployees are unfamiliar withthese organic items.

Virtual ServersOver 60% of IT decision makerscite malware infections as theirhighest concern related to theirdata center or cloud infrastructure. 9

Almost 700 mobile vulnerabilitieswere identified in 2016, of which,over 500 were related to Android (over 400% increase from 2015).10

Presented by:6060 Huntington Court NECedar Rapids, IA 52402www.securitycoverage.com

The average employee spends 91 hours per year sorting out various technology problems. Tech O�ce provides your business customerswith business security, cloud backup, password management and tech support for their o�ce devices. Let us handle these o�ce technologychallenges so employees can get back to work.

Businesses are increasingly vulnerable to cybersecurity threats targeting computers, servers and mobile devices. With SecureIT Pro, your businesscustomers gain industry-leading protection from viruses, spyware, ransomware and phishing. From small to large o�ces, our techs will help with setup and support so business security remains at peak performance.

Technology-related decreases in productivity at the o�ce represents a significant monetary impact to your business customers. Available as a one-time service or subscription, our Midwest-based TotalTech Professional technicians are available 24|7|365 via chat, web or phone to remotely diagnose and resolve virtually any business technology issue.

1. Bitdefender Business Insights - https://businessinsights.bitdefender.com/us-cisos-companies-su�ered-breach2. Cyberedge Group - https://cyber-edge.com/cdr/3. Entrepeneur - https://www.entrepreneur.com/article/2422084. Security Intelligence - https://securityintelligence.com/10-key-findings-from-the-ponemon-institutes-mobile-iot-application-security-testing-study/5. Linksys - http://cache-www.linksys.com/resources/img/features/ea8500/Belkin_Linksys_FD_of_Networking_InfoBrief.pdf6. US-CERT - https://www.us-cert.gov/sites/default/files/publications/RisksOfPortableDevices.pdf7. Novastor - http://novabackup.novastor.com/blog/top-6-data-loss-causes-and-top-10-preventions/8. Tripwire - https://www.tripwire.com/company/research/black-hat-2016-survey-iot-risks-and-cyber-war/9. SANS Institute - https://www.sans.org/reading-room/whitepapers/analyst/state-dynamic-data-center-cloud-security-modern-enterprise-3631210. Skycure - https://www.skycure.com/blog/mobile-threats-year-in-review/

®

SOURCESLearn More About Our Business Solutions!Call - 1-877-725-4839

Recommended