Your SlideShare is downloading. ×
  • Like
Cyber Attacks Infographic IBM
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Cyber Attacks Infographic IBM


Cyber Attacks Infographic IBM

Cyber Attacks Infographic IBM

Published in Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads


Total Views
On SlideShare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. of attacks could have been prevented by following secure computing practices.1 33% 19% 80% 96% of cyber attacks occur in the amount of time it takes to make a cup of coffee.1 Attacks happen in minutes. Being safe takes seconds. Verify links yourself. Don’t open links or attachments unless you know they’re safe. Navigate to a website directly. Keep settings and software up-to-date. Maintain your security settings and upgrade software when prompted. Protect passwords. Create different, hard to guess passwords for each website and service you use. Connect to networks safely. Be careful what you transmit over open and public wireless networks and use VPN software when conducting business. Backup and encrypt data. Make sure that all business-related data is encrypted to prevent unauthorized access. Protect mobile devices. Be sure to keep your Bluetooth set as “undiscoverable.” Store information securely. Be careful where you store sensitive or confidential information. If you’re storing in the cloud, make sure you’re comfortable with the terms and conditions of the service provider. Here are 7 tips to stay safe and secure Attacks are more sophisticated. In 2011, there were Secure computing helps prevent them. can be prevented by having better “cyber hygiene,” performing quick tasks like changing passwords and updating computer software.3 more tools available for attacking mobile devices.2 A rising threat Attention required Cybercrimes are fast and frequent. The best protection is awareness of threats and smart digital habits. Cyber attacks: 1 2011 Data Breach Investigations Report, Verizon Risk Team 2 IBM X-Force 2011 Trend and Risk Report 3 Major General Jonathan Shaw, Head of Cybersecurity, Ministry of Defense, UK