SlideShare a Scribd company logo
1 of 42
Download to read offline
IT Manager’s Eyes Only
october 2015
TOP SEC
Multiple Intelligence reports have
identified significant, sinister threats
to global email communication networks
from coordinated underworld cyber
criminals. The threat is real and
substantial. Immediate action is
recommended to avoid catastrophe.
TOP SEC
Email remains the most common and
prevalent form of communication
in the business world.
RADICATI.COM
The total number of worldwide email
users, including both business and
consumers, is projected to go from
over 2.5 billion in 2014 to over 2.8
billion in 2018.
RADICATI.COM
Business users send and receive on average
121 emails a day in 2014 (projected to be 140
emails a day by 2018)
In 2014, the majority of email traffic came from
the business world, which accounts for over 108.7
billion emails sent and received per day.
By 2018, business email will account for over 139.4
billion emails sent and received per day.
By the end of 2018, worldwide mobile email users are
expected to total over 2.2 billion.
RADICATI.COM
The rapid expansion of email as the
single biggest primary
business communication channel has
fuelled a counter culture in
security threats and data breaches.
Spam, malware, ransomware and
phishing are all rising.
Think about your own company when you
view the following slides…
of employees access personal email from their business
computer, more than double the level of authorised use.
PINECOMPUTERS.NET
The average cost of a
data breach for large
enterprises is $429,000,
and 88% of companies have
experienced some degree
of data loss.
of employees receive
unencrypted, risky
corporate data via
email or attachment.
People send and receive
an average of 15 email
attachments every day
(over 5,000 attachments
per year).
THEAMERICANGENIUS.COM
SYMANTEC.COM
Cyber criminals targeted 5 out of 6 large companies
using email attacks in 2014 (an increase of 40%).
SME businesses also saw an uptick, with attacks
increasing 26% and 30% respectively.
unsolicited messages contain a
malicious attachment or link.
WWW2.TRUSTWAVE.COM
28% of breaches result from poor passwords, and
another 28% from weak remote access security.
WWW2.TRUSTWAVE.COM
39% of passwords are eight characters, a length
that takes an average of one day to crack.
(Compare that to 10-character passwords, which
take an average of 591 days.)WWW2.TRUSTWAVE.COM
increase in total cost
over 2013 levels.
In 2014, the average
cost of an enterprise
data breach reached
$3.79 million, a
WWW-01.IBM.COM
www.symantec.com
An increase of 317 million new
pieces of malware were created.
There are over 1.7 billion pieces
of malware currently in circulation
that could infect your inbox.
Non-targeted attacks of malware
increased by 26% in 2014.
WWW.SYMANTEC.COM
WW.SYMANTEC.COMWWW.SYMANTEC.COM
YOU CANNOT DEPEND ON VIRTUAL SANDBOXING
TO OBSERVE AND DETECT MALWARE.
Certain malware like W32.Crisis, upon detecting
a virtual machine, will search for other
virtual machine images and infect them.
In 2014, up to 28% of all malware
was ‘virtual machine aware’.
WWW.SYMANTEC.COM
There was a 4,000% increase in crypto-ransomware attacks.
Ransomware attacks grew 113% in 2014.
WWW.SYMANTEC.COM
WWW.SYMANTEC.COM
In 2013, crypto-ransomware
accounted for approximately
0.2 percent of all ransomware
attacks. By the end of 2014
this figure grgew to 4 percent
WWW.SYMANTEC.COM
GETCYBERSAFE.GC.CA
PHISHING ATTACKS COST GLOBAL ORGANISATIONS
$4.5 BILLION IN LOSSES IN 2014.
EMC.COM
from 2010 to 2014.
Phishing attacks rose by
EMC.COM
of people globally can’t correctly
identify a sophisticated phishing email.
securityaffairs.co
phishing.org
Spear phishing file type
breakdown analysis 2014
WWW.SYMANTEC.COM
Risk ratio of spear
phishing attacks by
industry
The mining industry
was the most heavily
targeted in 2014, with
43 percent (1 in 2.3)
of mining organizations
being targeted at least
once during the year.
WWW.SYMANTEC.COM
WWW.SYMANTEC.COM
Individuals in sales/
marketing job roles
were the most targeted
in 2014, with 1 in 2.9
of them being targeted
at least once; this
is equivalent to 35%
of sales/marketing
personnel
Cybercriminals rely on an underground
online economy to buy and sell
services and malware and to fence stolen
credit cards and botnets.
CYBERCRIME HAS A 1,425%
RETURN ON INVESTMENT.
WWW.SYMANTEC.COM
45% of businesses have board or senior level
management who take only a partial role in security
matters. 9% do not partake at all.
IN MANY CASES, THE IT MANAGER MUST TAKE FULL
RESPONSIBILITY ON THEIR OWN.
trustwave.com
In 2013, 4 out of 5 IT professionals were pressured
to rollout IT projects despite security issues.
forbes.com
of decision makers are facing
pressure to release IT projects that
are not security ready.
TRUSTWAVE.COM
Defend against email threats.
Deploy an email security service,
with multiple safeguards including
anti-spam, anti-malware and content
filtering capabilities.
Secure email traffic content.
Block or flag all executable files
and all suspicious orunusual file
attachments, such as .cpl, .chm and
.lnk files. Create alternative
methods for file sharing.
Ensure email security service
can handle blended threats that
combine spam with links to
malicious websites.
Educate users, from the bottom ranks
all the way up to the C-suite, on
the nature of today’s email attacks
and conduct mock phishing exercises.
Consider upgrading your IT
email defences with Blockmail.
1.
2.
3.
4.
5.
Unit 1, Block C, The Exchange
Calmount Park, Ballymount, Dublin 12, Ireland
Telephone: +353 (0)1 466 0686
Fax: + 353 (0)1 466 0687
Topsec Technology UK
Castle Hill House
12 Castle Hill, Windsor, SL4 1PD, United Kingdom
Telephone: + 44 (1784)725903
Topsec Technology Canada
Suite 830, 5991 Spring Garden Road
Halifax, B3H 1Y6, Nova Scotia
Telephone: + 1 902 430 9340
Email:
For sales enquiries: sales@topsectechnology.com
For support enquiries: support@topsectechnology.com
For DNS enquiries: dns@topsectechnology.com
DISCOVER MORE ABOUT HOW TO
COMBAT MALWARE AND SPAM WITH
OUR FREE EBOOK DOWNLOAD.
START YOUR FREE TRIAL TODAY
produced by
DOWNLOAD HERE

More Related Content

What's hot

Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industrySeqrite
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web ThreatsKim Jensen
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?Samvel Gevorgyan
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
Understanding SaaS Concepts
Understanding SaaS ConceptsUnderstanding SaaS Concepts
Understanding SaaS Conceptsguest0e7119
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public SectorSeqrite
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android applicationIAEME Publication
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingSeqrite
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityPatty Ramsey
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss PreventionSeqrite
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 

What's hot (20)

Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Email threats
Email threatsEmail threats
Email threats
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
2013 Threat Report
2013 Threat Report2013 Threat Report
2013 Threat Report
 
Understanding SaaS Concepts
Understanding SaaS ConceptsUnderstanding SaaS Concepts
Understanding SaaS Concepts
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Knowbe4 presentation
Knowbe4 presentationKnowbe4 presentation
Knowbe4 presentation
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 

Similar to Email Security Threats: IT Manager's Eyes Only

Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar SessionKalilur Rahman
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessIndusfacePvtLtd
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce websiteDr. Raghavendra GS
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of ITMahdiRahmani15
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?MaryJWilliams2
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfkirtigoyal328
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015RapidSSLOnline.com
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enAndrey Apuhtin
 

Similar to Email Security Threats: IT Manager's Eyes Only (20)

Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your Business
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Data security
 Data security  Data security
Data security
 
What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
W verb68
W verb68W verb68
W verb68
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-en
 

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Recently uploaded (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Email Security Threats: IT Manager's Eyes Only

  • 1. IT Manager’s Eyes Only october 2015 TOP SEC
  • 2. Multiple Intelligence reports have identified significant, sinister threats to global email communication networks from coordinated underworld cyber criminals. The threat is real and substantial. Immediate action is recommended to avoid catastrophe. TOP SEC
  • 3. Email remains the most common and prevalent form of communication in the business world. RADICATI.COM
  • 4. The total number of worldwide email users, including both business and consumers, is projected to go from over 2.5 billion in 2014 to over 2.8 billion in 2018. RADICATI.COM
  • 5. Business users send and receive on average 121 emails a day in 2014 (projected to be 140 emails a day by 2018) In 2014, the majority of email traffic came from the business world, which accounts for over 108.7 billion emails sent and received per day. By 2018, business email will account for over 139.4 billion emails sent and received per day. By the end of 2018, worldwide mobile email users are expected to total over 2.2 billion. RADICATI.COM
  • 6. The rapid expansion of email as the single biggest primary business communication channel has fuelled a counter culture in security threats and data breaches.
  • 7. Spam, malware, ransomware and phishing are all rising.
  • 8. Think about your own company when you view the following slides…
  • 9. of employees access personal email from their business computer, more than double the level of authorised use. PINECOMPUTERS.NET
  • 10. The average cost of a data breach for large enterprises is $429,000, and 88% of companies have experienced some degree of data loss. of employees receive unencrypted, risky corporate data via email or attachment. People send and receive an average of 15 email attachments every day (over 5,000 attachments per year). THEAMERICANGENIUS.COM
  • 11. SYMANTEC.COM Cyber criminals targeted 5 out of 6 large companies using email attacks in 2014 (an increase of 40%). SME businesses also saw an uptick, with attacks increasing 26% and 30% respectively.
  • 12. unsolicited messages contain a malicious attachment or link. WWW2.TRUSTWAVE.COM
  • 13. 28% of breaches result from poor passwords, and another 28% from weak remote access security. WWW2.TRUSTWAVE.COM
  • 14. 39% of passwords are eight characters, a length that takes an average of one day to crack. (Compare that to 10-character passwords, which take an average of 591 days.)WWW2.TRUSTWAVE.COM
  • 15. increase in total cost over 2013 levels. In 2014, the average cost of an enterprise data breach reached $3.79 million, a WWW-01.IBM.COM
  • 17.
  • 18. An increase of 317 million new pieces of malware were created. There are over 1.7 billion pieces of malware currently in circulation that could infect your inbox. Non-targeted attacks of malware increased by 26% in 2014. WWW.SYMANTEC.COM
  • 20. YOU CANNOT DEPEND ON VIRTUAL SANDBOXING TO OBSERVE AND DETECT MALWARE. Certain malware like W32.Crisis, upon detecting a virtual machine, will search for other virtual machine images and infect them. In 2014, up to 28% of all malware was ‘virtual machine aware’. WWW.SYMANTEC.COM
  • 21.
  • 22. There was a 4,000% increase in crypto-ransomware attacks. Ransomware attacks grew 113% in 2014. WWW.SYMANTEC.COM
  • 24. In 2013, crypto-ransomware accounted for approximately 0.2 percent of all ransomware attacks. By the end of 2014 this figure grgew to 4 percent WWW.SYMANTEC.COM
  • 25.
  • 27. PHISHING ATTACKS COST GLOBAL ORGANISATIONS $4.5 BILLION IN LOSSES IN 2014. EMC.COM
  • 28. from 2010 to 2014. Phishing attacks rose by EMC.COM
  • 29. of people globally can’t correctly identify a sophisticated phishing email. securityaffairs.co
  • 31.
  • 32. Spear phishing file type breakdown analysis 2014 WWW.SYMANTEC.COM
  • 33. Risk ratio of spear phishing attacks by industry The mining industry was the most heavily targeted in 2014, with 43 percent (1 in 2.3) of mining organizations being targeted at least once during the year. WWW.SYMANTEC.COM
  • 34. WWW.SYMANTEC.COM Individuals in sales/ marketing job roles were the most targeted in 2014, with 1 in 2.9 of them being targeted at least once; this is equivalent to 35% of sales/marketing personnel
  • 35. Cybercriminals rely on an underground online economy to buy and sell services and malware and to fence stolen credit cards and botnets. CYBERCRIME HAS A 1,425% RETURN ON INVESTMENT.
  • 37.
  • 38. 45% of businesses have board or senior level management who take only a partial role in security matters. 9% do not partake at all. IN MANY CASES, THE IT MANAGER MUST TAKE FULL RESPONSIBILITY ON THEIR OWN. trustwave.com
  • 39. In 2013, 4 out of 5 IT professionals were pressured to rollout IT projects despite security issues. forbes.com
  • 40. of decision makers are facing pressure to release IT projects that are not security ready. TRUSTWAVE.COM
  • 41. Defend against email threats. Deploy an email security service, with multiple safeguards including anti-spam, anti-malware and content filtering capabilities. Secure email traffic content. Block or flag all executable files and all suspicious orunusual file attachments, such as .cpl, .chm and .lnk files. Create alternative methods for file sharing. Ensure email security service can handle blended threats that combine spam with links to malicious websites. Educate users, from the bottom ranks all the way up to the C-suite, on the nature of today’s email attacks and conduct mock phishing exercises. Consider upgrading your IT email defences with Blockmail. 1. 2. 3. 4. 5.
  • 42. Unit 1, Block C, The Exchange Calmount Park, Ballymount, Dublin 12, Ireland Telephone: +353 (0)1 466 0686 Fax: + 353 (0)1 466 0687 Topsec Technology UK Castle Hill House 12 Castle Hill, Windsor, SL4 1PD, United Kingdom Telephone: + 44 (1784)725903 Topsec Technology Canada Suite 830, 5991 Spring Garden Road Halifax, B3H 1Y6, Nova Scotia Telephone: + 1 902 430 9340 Email: For sales enquiries: sales@topsectechnology.com For support enquiries: support@topsectechnology.com For DNS enquiries: dns@topsectechnology.com DISCOVER MORE ABOUT HOW TO COMBAT MALWARE AND SPAM WITH OUR FREE EBOOK DOWNLOAD. START YOUR FREE TRIAL TODAY produced by DOWNLOAD HERE