SlideShare a Scribd company logo
1 of 20
Download to read offline
THE DARK SIDE
OF THE WEB
Q4 2014 Published Q1 2015
we create as much information as we did
from the dawn of human civilization up until 2003
EVERY 2 DAYS
does William Shatner wear a toupee?
Google now searches
35 TRILLION WEBPAGES
That’s 4,375 times the size of the web just 10 years ago
And there are thousands of cloud apps
that can make you more productive
The average employee uses
27 apps at work
Collaboration
Social Media
Content Sharing
File Sharing
Business Intelligence
Other
HERE ARE SOME OF THE TOP APPS IN USE
1. Dropbox
2. Google Drive
3. Box
4. OneDrive
5. ShareFile
6. Yandex.Disk
7. Hightail
8. 4shared
9. Firedrive
10. Zippyshare
TOP
SERVICES
by category
FILE SHARING COLLABORATION SOCIAL MEDIA
1.
2. Gmail
3. Yammer
4. Yahoo! Mail
5. Cisco WebEx
6. Google Apps
7. Skype
8. Evernote
9. Prezi
10. GoToMeeting
Microsoft
Office 365
1. Facebook
2. Twitter
3. LinkedIn
4. Tumblr
5. Sina Weibo
6. VK
7. Foursquare
8. Badoo
9. LiveJournal
10. Renren
THESE FILE-SHARING
APPS ARE NOW THE
HOME OF SENSITIVE DATA
of files uploaded to file-sharing
services contain sensitive data
of users have uploaded sensitive
data to a file-sharing service22% 37%
DOWNLOAD NOW
CLOUD ADOPTION
& RISK REPORT
Q3 2014
Published Q4 2014
Download the Full Report
Get the full report with
detailed statistics on the
top cloud services,
fastest growing apps,
and risks you can avoid
in the cloud.
CLOUD ADOPTION
& RISK REPORT
Q4 2014
Published Q1 2015
It’s estimated the “dark web” or “deep web” is 500
times larger than what’s searchable by Google
THE REACH AND ANONYMITY OF
THE WEB MAKE ITS DARK
CORNERS THE PERFECT BLACK MARKET
ON DARK WEB MARKETPLACES
SUCH AS THE NOW-DEFUNCT
SILK ROAD, YOU CAN BUY:
DRUGS
WEAPONS
HITMEN
FORGED
PASSPORTS
YOU CAN ALSO BUY STOLEN
LOGIN CREDENTIALS
PASSWORD
**********
HOW BIG IS THIS PROBLEM?
OF COMPANIES HAVE AT LEAST 1 EMPLOYEE
WITH COMPROMISED CREDENTIALS92%
One Fortune 500 company has
10,155 compromised credentials
including file sharing, collaboration,
CRM, and financial applications
AND 12% OF ALL USERS HAVE AT LEAST
ONE COMPROMISED CREDENTIAL
Financial
Government
Healthcare
High tech
Manufacturing
Media
Pharmaceutical
Real estate
Telecommunications
Utilities
Energy
9%
6%
5%
15%
9%
14%
12%
19%
9%
18%
11%
% of employees with at least one password stolen
INDUSTRIES
MOST EXPOSED
TO COMPROMISED
ACCOUNTS
Tip: to limit your exposure don’t be one of the 31%
of people who reuse passwords across apps
Use a strong, unique password for every single app and change
the most important ones every 3 months
DOWNLOAD NOW
CLOUD ADOPTION
& RISK REPORT
Q3 2014
Published Q4 2014
Download the Full Report
Get the full report with
detailed statistics on the
top cloud services,
fastest growing apps,
and risks you can avoid
in the cloud.
CLOUD ADOPTION
& RISK REPORT
Q4 2014
Published Q1 2015

More Related Content

What's hot

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital WorkplaceCitrix
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
 
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportSummer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportNetskope
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIBM Security
 
[Infographic] Productivity in the Cloud
[Infographic] Productivity in the Cloud[Infographic] Productivity in the Cloud
[Infographic] Productivity in the CloudRapidScale
 
Cloud computing in Thailand readiness survey
Cloud computing in Thailand readiness surveyCloud computing in Thailand readiness survey
Cloud computing in Thailand readiness surveyIMC Institute
 
The attention economy and the internet
The attention economy and the internetThe attention economy and the internet
The attention economy and the internetRoss Garrett
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationCloudLock
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityStop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityCloudLock
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes MobileNetApp
 
Ravi Namboori - Developing Cloud Applications In The New IT Era
Ravi Namboori - Developing Cloud Applications In The New IT EraRavi Namboori - Developing Cloud Applications In The New IT Era
Ravi Namboori - Developing Cloud Applications In The New IT EraRavi namboori
 
Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?HostingCon
 
Top tips to develop your enterprise mobility strategy [Infographic]
Top tips to develop your enterprise mobility strategy [Infographic]Top tips to develop your enterprise mobility strategy [Infographic]
Top tips to develop your enterprise mobility strategy [Infographic]Vodafone Business
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...Black Duck by Synopsys
 
Importance of web application development
Importance of web application developmentImportance of web application development
Importance of web application developmentRahim Makhani
 
Codeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWSCodeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWSCloudLock
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessIBM Security
 

What's hot (20)

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
 
BeYOnD BYOD
BeYOnD BYODBeYOnD BYOD
BeYOnD BYOD
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportSummer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud Report
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
[Infographic] Productivity in the Cloud
[Infographic] Productivity in the Cloud[Infographic] Productivity in the Cloud
[Infographic] Productivity in the Cloud
 
Megatrends and Data - Adapting to Disruption
Megatrends and Data - Adapting to DisruptionMegatrends and Data - Adapting to Disruption
Megatrends and Data - Adapting to Disruption
 
Cloud computing in Thailand readiness survey
Cloud computing in Thailand readiness surveyCloud computing in Thailand readiness survey
Cloud computing in Thailand readiness survey
 
The attention economy and the internet
The attention economy and the internetThe attention economy and the internet
The attention economy and the internet
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityStop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes Mobile
 
Predictions idc2013
Predictions idc2013Predictions idc2013
Predictions idc2013
 
Ravi Namboori - Developing Cloud Applications In The New IT Era
Ravi Namboori - Developing Cloud Applications In The New IT EraRavi Namboori - Developing Cloud Applications In The New IT Era
Ravi Namboori - Developing Cloud Applications In The New IT Era
 
Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?
 
Top tips to develop your enterprise mobility strategy [Infographic]
Top tips to develop your enterprise mobility strategy [Infographic]Top tips to develop your enterprise mobility strategy [Infographic]
Top tips to develop your enterprise mobility strategy [Infographic]
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
 
Importance of web application development
Importance of web application developmentImportance of web application development
Importance of web application development
 
Codeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWSCodeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWS
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
 

Viewers also liked

How to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink YouHow to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink YouSkyhigh Networks
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines Skyhigh Networks
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaAsheem Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmSergio Loureiro
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - FranticMiika Puputti
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSkyhigh Networks
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve JobsHubSpot
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 

Viewers also liked (9)

How to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink YouHow to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink You
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - Frantic
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done Right
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 

Similar to The Dark Side of the Web

Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012Philip Oakley
 
The Digital Workplace Revolution
The Digital Workplace RevolutionThe Digital Workplace Revolution
The Digital Workplace RevolutionAtlas Cloud
 
What is 'Cloud Computing'?
What is 'Cloud Computing'?What is 'Cloud Computing'?
What is 'Cloud Computing'?CLASS Training
 
Cloud Computing - An Introduction to Cloud Computing Services
Cloud Computing - An Introduction to Cloud Computing ServicesCloud Computing - An Introduction to Cloud Computing Services
Cloud Computing - An Introduction to Cloud Computing ServicesStreym IT Solutions
 
SxSW: Can we save the open web?
SxSW: Can we save the open web?SxSW: Can we save the open web?
SxSW: Can we save the open web?Dries Buytaert
 
Can we save the open web?
Can we save the open web?Can we save the open web?
Can we save the open web?Acquia
 
Employing cloud ian moyse - workbooks - whitepaper
Employing cloud   ian moyse - workbooks - whitepaperEmploying cloud   ian moyse - workbooks - whitepaper
Employing cloud ian moyse - workbooks - whitepaperITpreneurs
 
Why hybrid cloud continues to grow: A look at real use cases
Why hybrid cloud continues to grow: A look at real use casesWhy hybrid cloud continues to grow: A look at real use cases
Why hybrid cloud continues to grow: A look at real use casesTyrone Systems
 
Nonprofit and Library Technology Trends for 2019
Nonprofit and Library Technology Trends for 2019Nonprofit and Library Technology Trends for 2019
Nonprofit and Library Technology Trends for 2019TechSoup
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 
Secrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the sceneSecrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the sceneDavid Terrar
 
SUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of businessSUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of businessMark Stokes
 
The Digital Marketing Revolution: 22 years in 16 charts
The Digital Marketing Revolution: 22 years in 16 chartsThe Digital Marketing Revolution: 22 years in 16 charts
The Digital Marketing Revolution: 22 years in 16 chartsNoreen Seebacher
 
Ap i ot_1407
Ap i ot_1407Ap i ot_1407
Ap i ot_1407mantruvic
 
The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change) The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change) Lori MacVittie
 
Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015Prayukth K V
 

Similar to The Dark Side of the Web (20)

Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012
 
The Digital Workplace Revolution
The Digital Workplace RevolutionThe Digital Workplace Revolution
The Digital Workplace Revolution
 
What is 'Cloud Computing'?
What is 'Cloud Computing'?What is 'Cloud Computing'?
What is 'Cloud Computing'?
 
Cloud Computing - An Introduction to Cloud Computing Services
Cloud Computing - An Introduction to Cloud Computing ServicesCloud Computing - An Introduction to Cloud Computing Services
Cloud Computing - An Introduction to Cloud Computing Services
 
SxSW: Can we save the open web?
SxSW: Can we save the open web?SxSW: Can we save the open web?
SxSW: Can we save the open web?
 
Can we save the open web?
Can we save the open web?Can we save the open web?
Can we save the open web?
 
Employing cloud ian moyse - workbooks - whitepaper
Employing cloud   ian moyse - workbooks - whitepaperEmploying cloud   ian moyse - workbooks - whitepaper
Employing cloud ian moyse - workbooks - whitepaper
 
Why hybrid cloud continues to grow: A look at real use cases
Why hybrid cloud continues to grow: A look at real use casesWhy hybrid cloud continues to grow: A look at real use cases
Why hybrid cloud continues to grow: A look at real use cases
 
Nonprofit and Library Technology Trends for 2019
Nonprofit and Library Technology Trends for 2019Nonprofit and Library Technology Trends for 2019
Nonprofit and Library Technology Trends for 2019
 
Security that works
Security that worksSecurity that works
Security that works
 
Internet of Things - Industry Influence Study
Internet of Things - Industry Influence StudyInternet of Things - Industry Influence Study
Internet of Things - Industry Influence Study
 
5 tech trends to watch in 2011
5 tech  trends to watch in 20115 tech  trends to watch in 2011
5 tech trends to watch in 2011
 
Secrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the sceneSecrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the scene
 
SUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of businessSUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of business
 
The 10 best performing document management solution providers 2018
The 10 best performing document management solution providers 2018The 10 best performing document management solution providers 2018
The 10 best performing document management solution providers 2018
 
The Digital Marketing Revolution: 22 years in 16 charts
The Digital Marketing Revolution: 22 years in 16 chartsThe Digital Marketing Revolution: 22 years in 16 charts
The Digital Marketing Revolution: 22 years in 16 charts
 
Ap i ot_1407
Ap i ot_1407Ap i ot_1407
Ap i ot_1407
 
The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change) The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change)
 
Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015
 
Six Sites Short
Six Sites ShortSix Sites Short
Six Sites Short
 

Recently uploaded

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

The Dark Side of the Web

  • 1. THE DARK SIDE OF THE WEB Q4 2014 Published Q1 2015
  • 2. we create as much information as we did from the dawn of human civilization up until 2003 EVERY 2 DAYS
  • 3. does William Shatner wear a toupee? Google now searches 35 TRILLION WEBPAGES That’s 4,375 times the size of the web just 10 years ago
  • 4. And there are thousands of cloud apps that can make you more productive
  • 5. The average employee uses 27 apps at work Collaboration Social Media Content Sharing File Sharing Business Intelligence Other
  • 6. HERE ARE SOME OF THE TOP APPS IN USE
  • 7. 1. Dropbox 2. Google Drive 3. Box 4. OneDrive 5. ShareFile 6. Yandex.Disk 7. Hightail 8. 4shared 9. Firedrive 10. Zippyshare TOP SERVICES by category FILE SHARING COLLABORATION SOCIAL MEDIA 1. 2. Gmail 3. Yammer 4. Yahoo! Mail 5. Cisco WebEx 6. Google Apps 7. Skype 8. Evernote 9. Prezi 10. GoToMeeting Microsoft Office 365 1. Facebook 2. Twitter 3. LinkedIn 4. Tumblr 5. Sina Weibo 6. VK 7. Foursquare 8. Badoo 9. LiveJournal 10. Renren
  • 8. THESE FILE-SHARING APPS ARE NOW THE HOME OF SENSITIVE DATA of files uploaded to file-sharing services contain sensitive data of users have uploaded sensitive data to a file-sharing service22% 37%
  • 9. DOWNLOAD NOW CLOUD ADOPTION & RISK REPORT Q3 2014 Published Q4 2014 Download the Full Report Get the full report with detailed statistics on the top cloud services, fastest growing apps, and risks you can avoid in the cloud. CLOUD ADOPTION & RISK REPORT Q4 2014 Published Q1 2015
  • 10. It’s estimated the “dark web” or “deep web” is 500 times larger than what’s searchable by Google
  • 11. THE REACH AND ANONYMITY OF THE WEB MAKE ITS DARK CORNERS THE PERFECT BLACK MARKET
  • 12. ON DARK WEB MARKETPLACES SUCH AS THE NOW-DEFUNCT SILK ROAD, YOU CAN BUY: DRUGS WEAPONS HITMEN FORGED PASSPORTS
  • 13. YOU CAN ALSO BUY STOLEN LOGIN CREDENTIALS PASSWORD **********
  • 14. HOW BIG IS THIS PROBLEM?
  • 15. OF COMPANIES HAVE AT LEAST 1 EMPLOYEE WITH COMPROMISED CREDENTIALS92%
  • 16. One Fortune 500 company has 10,155 compromised credentials including file sharing, collaboration, CRM, and financial applications
  • 17. AND 12% OF ALL USERS HAVE AT LEAST ONE COMPROMISED CREDENTIAL
  • 19. Tip: to limit your exposure don’t be one of the 31% of people who reuse passwords across apps Use a strong, unique password for every single app and change the most important ones every 3 months
  • 20. DOWNLOAD NOW CLOUD ADOPTION & RISK REPORT Q3 2014 Published Q4 2014 Download the Full Report Get the full report with detailed statistics on the top cloud services, fastest growing apps, and risks you can avoid in the cloud. CLOUD ADOPTION & RISK REPORT Q4 2014 Published Q1 2015