SlideShare a Scribd company logo
1 of 13
Download to read offline
web security | data security | email security © 2009 Websense, Inc. All rights reserved.
State of Technology Security
TOP 10 Biggest Security Threats
© 2009 Websense, Inc. All rights reserved. 2
State Of Technology Security: Top 10 Biggest Security Threats
http://www.crn.com/security/220601208;jsessionid=GHEYGNNS
X5C0LQE1GHOSKH4ATMY32JVN
19 OKTOBER 2009
1. Data Breaches
© 2009 Websense, Inc. All rights reserved. 3
2. Internal Threats
© 2009 Websense, Inc. All rights reserved. 4
3. Social Networking Threats
© 2009 Websense, Inc. All rights reserved. 5
4. Trojans / Keyloggers / Botnets
© 2009 Websense, Inc. All rights reserved. 6
© 2009 Websense, Inc. All rights reserved. 7
5. Phishing/Social Engineering
© 2009 Websense, Inc. All rights reserved. 8
6. Viruses
© 2009 Websense, Inc. All rights reserved. 9
7. Internet Worms
© 2009 Websense, Inc. All rights reserved. 10
8. Organized Cybercrime Networks
© 2009 Websense, Inc. All rights reserved. 11
9. Cyberespionage
© 2009 Websense, Inc. All rights reserved. 12
10. Zero-Day Exploits
© 2009 Websense, Inc. All rights reserved. 13
Kontakt
For yderligere information kontakt :
Kim Rene Jensen
Territory Manager
Denmark, Faroe Island, Greenland
+45 31668595
krjensen@websense.com
Præsentationer, analyser mm.: www.slideshare.net/kimrenejensen
Følg Websense her :
Facebook : http://www.facebook.com/websense
Twitter : http://www.twitter.com/websense
YouTube : http://www.youtube.com/watch?v=0RvGhgeg5mU

More Related Content

What's hot

Simple Steps to Online Safety
 Simple Steps to Online Safety  Simple Steps to Online Safety
Simple Steps to Online Safety Symantec
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must FollowQuick Heal Technologies Ltd.
 
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...NetworkCollaborators
 
Pure retail training presentation
Pure retail training presentationPure retail training presentation
Pure retail training presentationkatelyn-fogarty
 
Pure retail training presentation v2
Pure retail training presentation v2Pure retail training presentation v2
Pure retail training presentation v2kaspersky-lab
 
Pure retail training non animation
Pure retail training non animationPure retail training non animation
Pure retail training non animationkatelyn-fogarty
 
Storage visibility and Optimization. A Story of Ceph
Storage visibility and Optimization.  A Story of CephStorage visibility and Optimization.  A Story of Ceph
Storage visibility and Optimization. A Story of CephYathiraj Udupi, Ph.D.
 
Internet Security at Work Presentation
Internet Security at Work PresentationInternet Security at Work Presentation
Internet Security at Work Presentationredbackacademy
 
Cyber crime & browsers
Cyber crime & browsersCyber crime & browsers
Cyber crime & browsersMayuri Pujare
 
[THEC Talk] The Secure Network
[THEC Talk] The Secure Network[THEC Talk] The Secure Network
[THEC Talk] The Secure NetworkDavid Metge
 
D3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the CurveD3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the CurveImperva Incapsula
 
DevSec - build security in and dance like a pro!
DevSec - build security in and dance like a pro!DevSec - build security in and dance like a pro!
DevSec - build security in and dance like a pro!lokori
 
How to sign up and use Telstra Safe Social™
How to sign up and use Telstra Safe Social™How to sign up and use Telstra Safe Social™
How to sign up and use Telstra Safe Social™Telstra
 
Best Information Security Tips for Better Computing
Best Information Security Tips for Better ComputingBest Information Security Tips for Better Computing
Best Information Security Tips for Better ComputingPatten John
 
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Joe CFO for CiscoLive Berlin 2016 Email and Web Security PresentationJoe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Joe CFO for CiscoLive Berlin 2016 Email and Web Security PresentationBruce Johnson
 
10 Things to help you be less dump at computers
10 Things to help you be less dump at computers10 Things to help you be less dump at computers
10 Things to help you be less dump at computersEric Fickes
 

What's hot (19)

Simple Steps to Online Safety
 Simple Steps to Online Safety  Simple Steps to Online Safety
Simple Steps to Online Safety
 
Anti virus
Anti virusAnti virus
Anti virus
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow
 
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
 
Pure retail training presentation
Pure retail training presentationPure retail training presentation
Pure retail training presentation
 
Pure retail training presentation v2
Pure retail training presentation v2Pure retail training presentation v2
Pure retail training presentation v2
 
Pure retail training non animation
Pure retail training non animationPure retail training non animation
Pure retail training non animation
 
1
11
1
 
How much should you reveal on social media
How much should you reveal on social mediaHow much should you reveal on social media
How much should you reveal on social media
 
Storage visibility and Optimization. A Story of Ceph
Storage visibility and Optimization.  A Story of CephStorage visibility and Optimization.  A Story of Ceph
Storage visibility and Optimization. A Story of Ceph
 
Internet Security at Work Presentation
Internet Security at Work PresentationInternet Security at Work Presentation
Internet Security at Work Presentation
 
Cyber crime & browsers
Cyber crime & browsersCyber crime & browsers
Cyber crime & browsers
 
[THEC Talk] The Secure Network
[THEC Talk] The Secure Network[THEC Talk] The Secure Network
[THEC Talk] The Secure Network
 
D3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the CurveD3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the Curve
 
DevSec - build security in and dance like a pro!
DevSec - build security in and dance like a pro!DevSec - build security in and dance like a pro!
DevSec - build security in and dance like a pro!
 
How to sign up and use Telstra Safe Social™
How to sign up and use Telstra Safe Social™How to sign up and use Telstra Safe Social™
How to sign up and use Telstra Safe Social™
 
Best Information Security Tips for Better Computing
Best Information Security Tips for Better ComputingBest Information Security Tips for Better Computing
Best Information Security Tips for Better Computing
 
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Joe CFO for CiscoLive Berlin 2016 Email and Web Security PresentationJoe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
 
10 Things to help you be less dump at computers
10 Things to help you be less dump at computers10 Things to help you be less dump at computers
10 Things to help you be less dump at computers
 

Viewers also liked

El Proyecto Matriz #102.¿ILEGALES?: EN BUSCA DE LIBERTAD HUMANA
El Proyecto Matriz #102.¿ILEGALES?: EN BUSCA DE LIBERTAD HUMANAEl Proyecto Matriz #102.¿ILEGALES?: EN BUSCA DE LIBERTAD HUMANA
El Proyecto Matriz #102.¿ILEGALES?: EN BUSCA DE LIBERTAD HUMANAProyecto Matriz
 
SISO LSA AND OMG DDS
SISO LSA AND OMG DDSSISO LSA AND OMG DDS
SISO LSA AND OMG DDSSimware
 
Loan training product 2014-3-8
Loan training  product 2014-3-8Loan training  product 2014-3-8
Loan training product 2014-3-8Roslan Abdullah
 
WFS AZ - Today’s Gadgets & Emerging Technology Innovations 10/21/15
WFS AZ - Today’s Gadgets & Emerging Technology Innovations 10/21/15WFS AZ - Today’s Gadgets & Emerging Technology Innovations 10/21/15
WFS AZ - Today’s Gadgets & Emerging Technology Innovations 10/21/15Mark Goldstein
 
Tenis y raquetas aconsejables
Tenis y raquetas aconsejablesTenis y raquetas aconsejables
Tenis y raquetas aconsejablesSonia Otero
 
Metaforer i GUI kan kastes! (Eller "flyttes til papirkurves")
Metaforer i GUI kan kastes! (Eller "flyttes til papirkurves")Metaforer i GUI kan kastes! (Eller "flyttes til papirkurves")
Metaforer i GUI kan kastes! (Eller "flyttes til papirkurves")jonwold
 
Corporate Brochure low
Corporate Brochure lowCorporate Brochure low
Corporate Brochure lowSimon notman
 
Shopaholictiestheknot
ShopaholictiestheknotShopaholictiestheknot
ShopaholictiestheknotPercy Lim
 
Diplomarbeit Vitus LM
Diplomarbeit Vitus LMDiplomarbeit Vitus LM
Diplomarbeit Vitus LMderDoc
 
Ecolife Recreio Eco Esfera E Mail
Ecolife Recreio   Eco Esfera   E MailEcolife Recreio   Eco Esfera   E Mail
Ecolife Recreio Eco Esfera E Mailimoveisdorio
 
Debugging PHP with xDebug inside of Eclipse PDT 2.1
Debugging PHP with xDebug inside of Eclipse PDT 2.1Debugging PHP with xDebug inside of Eclipse PDT 2.1
Debugging PHP with xDebug inside of Eclipse PDT 2.1Bastian Feder
 
Cuento de navidad teatro zorrilla ocio y rutas valladolid
Cuento de navidad teatro zorrilla ocio y rutas valladolidCuento de navidad teatro zorrilla ocio y rutas valladolid
Cuento de navidad teatro zorrilla ocio y rutas valladolidOcio y Rutas Valladolid
 
Revista Mundo Contact Agosto 2011
Revista Mundo Contact Agosto 2011Revista Mundo Contact Agosto 2011
Revista Mundo Contact Agosto 2011Mundo Contact
 
Nascholing problematisch ziekteverzuim voor casemanagers
Nascholing problematisch ziekteverzuim voor casemanagersNascholing problematisch ziekteverzuim voor casemanagers
Nascholing problematisch ziekteverzuim voor casemanagersErgatis
 

Viewers also liked (20)

El Proyecto Matriz #102.¿ILEGALES?: EN BUSCA DE LIBERTAD HUMANA
El Proyecto Matriz #102.¿ILEGALES?: EN BUSCA DE LIBERTAD HUMANAEl Proyecto Matriz #102.¿ILEGALES?: EN BUSCA DE LIBERTAD HUMANA
El Proyecto Matriz #102.¿ILEGALES?: EN BUSCA DE LIBERTAD HUMANA
 
OpenRISC processor
OpenRISC processorOpenRISC processor
OpenRISC processor
 
SISO LSA AND OMG DDS
SISO LSA AND OMG DDSSISO LSA AND OMG DDS
SISO LSA AND OMG DDS
 
Proyecto de Inversión en España - ES/DE
Proyecto de Inversión en España - ES/DEProyecto de Inversión en España - ES/DE
Proyecto de Inversión en España - ES/DE
 
Loan training product 2014-3-8
Loan training  product 2014-3-8Loan training  product 2014-3-8
Loan training product 2014-3-8
 
WFS AZ - Today’s Gadgets & Emerging Technology Innovations 10/21/15
WFS AZ - Today’s Gadgets & Emerging Technology Innovations 10/21/15WFS AZ - Today’s Gadgets & Emerging Technology Innovations 10/21/15
WFS AZ - Today’s Gadgets & Emerging Technology Innovations 10/21/15
 
Tenis y raquetas aconsejables
Tenis y raquetas aconsejablesTenis y raquetas aconsejables
Tenis y raquetas aconsejables
 
NC-2011-05-01-1
NC-2011-05-01-1NC-2011-05-01-1
NC-2011-05-01-1
 
Metaforer i GUI kan kastes! (Eller "flyttes til papirkurves")
Metaforer i GUI kan kastes! (Eller "flyttes til papirkurves")Metaforer i GUI kan kastes! (Eller "flyttes til papirkurves")
Metaforer i GUI kan kastes! (Eller "flyttes til papirkurves")
 
Corporate Brochure low
Corporate Brochure lowCorporate Brochure low
Corporate Brochure low
 
Shopaholictiestheknot
ShopaholictiestheknotShopaholictiestheknot
Shopaholictiestheknot
 
Diari del 23 de setembre de 2013
Diari del 23 de setembre de 2013Diari del 23 de setembre de 2013
Diari del 23 de setembre de 2013
 
Diplomarbeit Vitus LM
Diplomarbeit Vitus LMDiplomarbeit Vitus LM
Diplomarbeit Vitus LM
 
Ecolife Recreio Eco Esfera E Mail
Ecolife Recreio   Eco Esfera   E MailEcolife Recreio   Eco Esfera   E Mail
Ecolife Recreio Eco Esfera E Mail
 
Debugging PHP with xDebug inside of Eclipse PDT 2.1
Debugging PHP with xDebug inside of Eclipse PDT 2.1Debugging PHP with xDebug inside of Eclipse PDT 2.1
Debugging PHP with xDebug inside of Eclipse PDT 2.1
 
Cuento de navidad teatro zorrilla ocio y rutas valladolid
Cuento de navidad teatro zorrilla ocio y rutas valladolidCuento de navidad teatro zorrilla ocio y rutas valladolid
Cuento de navidad teatro zorrilla ocio y rutas valladolid
 
Revista Mundo Contact Agosto 2011
Revista Mundo Contact Agosto 2011Revista Mundo Contact Agosto 2011
Revista Mundo Contact Agosto 2011
 
Nascholing problematisch ziekteverzuim voor casemanagers
Nascholing problematisch ziekteverzuim voor casemanagersNascholing problematisch ziekteverzuim voor casemanagers
Nascholing problematisch ziekteverzuim voor casemanagers
 
Noticias nxt
Noticias nxtNoticias nxt
Noticias nxt
 
Grimentz (Suiza), el pueblo de las flores
Grimentz (Suiza), el pueblo de las floresGrimentz (Suiza), el pueblo de las flores
Grimentz (Suiza), el pueblo de las flores
 

More from Kim Jensen

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter packKim Jensen
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003Kim Jensen
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Kim Jensen
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportKim Jensen
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UKKim Jensen
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Kim Jensen
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012Kim Jensen
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Kim Jensen
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Kim Jensen
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011Kim Jensen
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Kim Jensen
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web SecurityKim Jensen
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Kim Jensen
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011Kim Jensen
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Kim Jensen
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Kim Jensen
 

More from Kim Jensen (20)

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web Security
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
 

Top10 Biggest Security Threats

  • 1. web security | data security | email security © 2009 Websense, Inc. All rights reserved. State of Technology Security TOP 10 Biggest Security Threats
  • 2. © 2009 Websense, Inc. All rights reserved. 2 State Of Technology Security: Top 10 Biggest Security Threats http://www.crn.com/security/220601208;jsessionid=GHEYGNNS X5C0LQE1GHOSKH4ATMY32JVN 19 OKTOBER 2009
  • 3. 1. Data Breaches © 2009 Websense, Inc. All rights reserved. 3
  • 4. 2. Internal Threats © 2009 Websense, Inc. All rights reserved. 4
  • 5. 3. Social Networking Threats © 2009 Websense, Inc. All rights reserved. 5
  • 6. 4. Trojans / Keyloggers / Botnets © 2009 Websense, Inc. All rights reserved. 6
  • 7. © 2009 Websense, Inc. All rights reserved. 7 5. Phishing/Social Engineering
  • 8. © 2009 Websense, Inc. All rights reserved. 8 6. Viruses
  • 9. © 2009 Websense, Inc. All rights reserved. 9 7. Internet Worms
  • 10. © 2009 Websense, Inc. All rights reserved. 10 8. Organized Cybercrime Networks
  • 11. © 2009 Websense, Inc. All rights reserved. 11 9. Cyberespionage
  • 12. © 2009 Websense, Inc. All rights reserved. 12 10. Zero-Day Exploits
  • 13. © 2009 Websense, Inc. All rights reserved. 13 Kontakt For yderligere information kontakt : Kim Rene Jensen Territory Manager Denmark, Faroe Island, Greenland +45 31668595 krjensen@websense.com Præsentationer, analyser mm.: www.slideshare.net/kimrenejensen Følg Websense her : Facebook : http://www.facebook.com/websense Twitter : http://www.twitter.com/websense YouTube : http://www.youtube.com/watch?v=0RvGhgeg5mU