Symantec Survey: Cybersecurity Threats! Are You Prepared?
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Symantec Survey: Cybersecurity Threats! Are You Prepared?

on

  • 3,508 views

According to a recent Symantec study, only 50 percent of organizations surveyed feel they are prepared for targeted attacks. Does your greatest security threat match what others have told us?

According to a recent Symantec study, only 50 percent of organizations surveyed feel they are prepared for targeted attacks. Does your greatest security threat match what others have told us?

Statistics

Views

Total Views
3,508
Views on SlideShare
3,220
Embed Views
288

Actions

Likes
4
Downloads
48
Comments
0

5 Embeds 288

https://twitter.com 281
https://www.linkedin.com 3
http://www.linkedin.com 2
http://getpocket.com 1
https://tweetdeck.twitter.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Symantec Survey: Cybersecurity Threats! Are You Prepared? Document Transcript

  • 1. THREATS!AREYOUPREPARED? TraditionalPC Threats 100 80 60 20 40 0 10 30 50 70 90 66% Risk NewMobile Threats Risk 100 80 60 20 40 0 10 30 50 70 90 71% Compromised Email Risk 100 80 60 20 40 0 10 30 50 70 90 66% 80 75 70 65 60 55 50 45 40 40 45 50 55 60 65 70 75 80 UNPREPAREDPREPARED HIGHRISKLOWRISK RECOMMENDATIONS 100 80 60 20 40 0 10 30 50 70 90 67% Prepared Advanced Persistent Threats Doyouhaveadequatein-house expertisetoremediate AdvancedPersistentThreats? 100 80 60 20 40 0 10 30 50 70 90 69% Risk Canasinglevendorprovidea completesolutionforAdvanced PersistentThreats/Advanced TargetedAttacks? Prepared 100 80 60 20 40 0 10 30 50 70 90 54% Prepared 100 80 60 20 40 0 10 30 50 70 90 55% Prepared 100 80 60 20 40 0 10 30 50 70 90 57% • Todays targeted attacks require a multi-layered approach– where data between the endpoints, web and messaging gateways, and data center is protected. • Advanced targeted attacks also require fast detection– accurate detection, analysis, and rapid remediation is key. A solution combineing global threat intelligence, fine-tuned correlation of attack activity across network and endpoint, and tightly integrated endpoint protection is ideal. • Secure devices– only legitimate users should be granted access to corporate assets. A strong two-factor authentication solution is a best practice. • Ultimately the data itself must be secured wherever it lives– encryption, mobile management, and data loss prevention solutions are essential components of an end-to-end security strategy. Securing Servers Securing Network Gateways 71% 70% Securing Mobile Devices 45% Securing Endpoints Correlating Data to Identify Threats Correlating Data to Identify Targeted Attacks 69% 51% 49% CurrentSecurity Effectiveness Finding employees with necessary security expertise Obtaining support from upper management Obtaining Budget 76% 60% Finding solutions to meet my needs 57% 53% Implementing desired integration or data sharing between security tools Implementing the chosen solution Devising a comprehensive security plan 60% 59% 57% KeyChallengesby Priority Protecting against data loss from insider threats Supporting BYOD Securing against APTs/advanced targeted attacks Securing access for remote or mobile users/devices 74% 73% Implementing security for virtual datacenter or private cloud 68% 62% Monitoring/protecting endpoints Securing against targeted attacks 72% 72% 69% FutureSecurityStrategies byImportance Yes48%No 36% No74% Yes26% No,butweareusing anoutsideservice 16% New Mobile Threats Access of Stolen/Lost Laptops Access of Stolen Mobile Devices Apple OSs Attacks Unauthorized Server Access Data Loss (insider threat) Traditional PC Threats Compromised Email Accounts Advanced Persistent Threats www.symantec.com