WHERE CYBERTHREATS OCCUR IN YOUR IT ECOSYSTEM   Your digital information lives in an ecosystem of three parts:            ...
Upcoming SlideShare
Loading in …5

Where Cyberthreats Occur in Your IT Ecosystem


Published on

To keep your data safe and secure, you need visibility into every part of the cybersecurity ecosystem. That means everything from your office to the network to remote servers. Take a look at the wide range of trouble spots that can affect your business. Learn More: http://bit.ly/U1N1eG

Recent Blog Post: "What's the best way to protect against cyber crime?" http://bit.ly/T4Mmtf

Published in: Technology
1 Comment
  • Learn more from a recent blog post on - 'What's the best way to protect against cyber crime?' http://blog.level3.com/security/whats-the-best-way-to-protect-against-cyber-crime
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Where Cyberthreats Occur in Your IT Ecosystem

  1. 1. WHERE CYBERTHREATS OCCUR IN YOUR IT ECOSYSTEM Your digital information lives in an ecosystem of three parts: YOUR OFFICE THE NETWORK REMOTE SERVERS where your data that your information where your data is stored is created travels over or manipulated To create a safe data environment, you need to secure each part. Your Office The most popular You could be the weakest link password is 123456 1 in the cybersecurity chain if your password is easy to guess or you reuse the same password across multiple systems. 69 % Amount of U.S. adults who use the same password for more than one online account.2 Have you ever noticed all the empty Ethernet jacks around your office? Anyone who plugs in has access to your network. Whether deliberate or not, your fellow workers can pose a huge security risk. Undocumented security policies Operating with are often the culprit. Sometimes outdated browser software, virus definitions or all a hacker needs to do is ask a unpatched software few innocent questions. is a disaster waiting to happen. 39 :( % 25 % Proportion of executives in a recent survey who admitted having a 4 security breach in the past year. Share of data breaches caused by negligence in 2011.3The Network 5 % Routers, switches and other appliances have operating systems that need frequent updates, but network operators are often reluctant to do so dueOut-of-Date Network to potential disruptions or Appliance Software software maintenance fees. Amount of malicious attacks 3 caused by internal personnel. Misconfigured Firewalls Advanced firewalls are difficult to set up. Misconfigured policy scripts are an open door that automated signature updates will never fix. Wireless Monitoring Network Terminations For hackers, wireless networks are DSL, cable modems and network interface devices often easier to monitor, track, crack often have administrative access interfaces that can be or record than their hardwired subject to attack like any other server. counterparts. In a related point, be aware that anyone can join that open wireless network you just happened to find. Hackers and hacktavists want to hurt or damageCyberattacks on 160 your business.critical U.S.infrastructure. 5 Cybercriminals 9 want to steal your data. 2009 2011 660 % Increase in cybersecurity incidents over the past four years.6Remote Servers Misconfigured The Internet Firewalls Hackers take advantage (Server Side) of others’ poorly secured Out-of-Date Remote systems to build botnets Network Software If you think it’s difficult to that can attack you. Your configure a firewall for one ISP should be able to organization, consider how Just like local network help you find botnets complex the rules can be devices, remote devices are and update your firewall for the average data center. vulnerable to attacks and rules accordingly. require regular updates. Misconfigured Servers SQL injection, cross-site scripting and the use of unnecessary applications can all expose data on remote servers to hackers. For more information about protecting your cybersecurity ecosystem visit www.level3.com/securityposter 1 Harris Interactive, 2012 2 Forbes, 2012 3 Forrester, 2011 4 Ponemon Institute, 2012 5 Internet Crime Complaint Center, 2011 6 Foreign Policy, 2012 © 2012 Level 3 Communications, LLC. All Rights Reserved.