SlideShare a Scribd company logo

2013 Cisco Annual Security Report

Expanding connectivity from any device to many clouds is having a significant impact on the threat landscape. As more people embrace multiple devices that connect to various networks and services through a wide range of applications, more vulnerabilities are exposed. Delve into the security threats and challenges of 2012 with analysis from Cisco's global threat intelligence. Download the report: http://www.cisco.com/go/securityreport.

1 of 24
Cisco Security Intelligence
Annual Security Report &
Cisco Connected World Technology Report
13BWEB REQUESTS
                                                            150M
                                                             GLOBALLY DEPLOYED ENDPOINTS
                                                                                           35%
                                                                                           WORLDWIDE EMAIL TRAFFIC




                                  75 TB
                                   DATA RECEIVED PER DAY
                                                                                1.6M
                                                                                 GLOBALLY DEPLOYED DEVICES




              SensorBase                                   Threat Operations Center             Dynamic Updates


© 2013 Cisco and/or its affiliates. All rights reserved.                                                      Cisco Confidential   2
36%
      22%
       Online video
                                                      search engines
                                                                        20%                         13%
                                                                       Social networks          Advertisements




                                                                                           Hits to Top Web Properties

                                                                              Social Network

                                                                                        Ads

                                                                                Online Video

                                                                              Search Engine

                                                                                               0%   10%      20%        30%             40%


© 2013 Cisco and/or its affiliates. All rights reserved.                                                                Cisco Confidential    3
Search Engines vs. Counterfeit Software

                                                    27x more likely to deliver malicious content
                                                    Online Advertisements vs. Pornography

                                                    182x more likely to deliver malicious content
                                                    Online Shopping vs. Counterfeit Software

                                                    21x more likely to deliver malicious content
© 2013 Cisco and/or its affiliates. All rights reserved.                                       Cisco Confidential   4
90%
                                                                                                                 Perscription Drugs
                                                                                                                 Prescription Drugs
   80%                                                                                                           Luxury Watches
                                                                                                                 Luxury Watches
                                                                                                                 Credit Card
                                                                                                                 Credit Card
   70%
                                                                                                                 Business Reviews
                                                                                                                 Business Reviews
                                                                                                                 Professional Network
   60%                                                                                                           Professional Network
                                                                                                                 Electronic Money Transfer
                                                                                                                 Electronic Money Transfer
                                                                                                                 Accounting Software
   50%                                                                                                           Accounting Software
                                                                                                                 Social Network
                                                                                                                 Social Network
                                                                                                                 Professional Associations
   40%                                                                                                           Professional Associations
                                                                                                                 Airline
                                                                                                                 Airline
   30%                                                                                                           Mail
                                                                                                                 Mail
                                                                                                                 Weight Loss
                                                                                                                 Weight Loss
                                                                                                                 Government Organization
   20%
                                                                                                                 Government Organization
                                                                                                                 Windows Software
   10%                                                                                                           Windows Software
                                                                                                                 Cellular Company
                                                                                                                 Cellular Company
                                                                                                                 Online Classifieds
     0%                                                                                                          Taxes
           Jan              Feb              Mar           Apr   May   Jun   Jul   Aug   Sep   Oct   Nov   Dec




© 2013 Cisco and/or its affiliates. All rights reserved.                                                                     Cisco Confidential   5
APRIL

                                                                  15
 January-March:                                            February-April:            January-March and
 Windows Software                                          Tax software spam during   September-December:
 spam, which coincided with                                U.S. tax season.           Spam based on Professional
 the release of the Microsoft                                                         networks like
 Windows 8 consumer                                                                   LinkedIn, correlated with
 preview                                                                              desire for a change in career
                                                                                      during the beginning and end
                                                                                      of the year.
© 2013 Cisco and/or its affiliates. All rights reserved.                                                 Cisco Confidential   6
Ad

Recommended

Il Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webIl Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webSymantec Italia
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyCisco Security
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the ApplicationCisco Security
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to CloudCisco Security
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Cisco Security
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco Security
 

More Related Content

Viewers also liked

Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
McAllen Intermediate School District
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School DistrictCisco Security
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityCisco Security
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security StrategiesCisco Security
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and PerformanceCisco Security
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security ChallengesCisco Security
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityCisco Security
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkCisco Security
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of InactivityCisco Security
 
William Paterson University
William Paterson UniversityWilliam Paterson University
William Paterson UniversityCisco Security
 
503 reading quiz
503 reading quiz503 reading quiz
503 reading quizamybass
 
Bertamasya ke banda
Bertamasya ke bandaBertamasya ke banda
Bertamasya ke bandaArya Ningrat
 

Viewers also liked (14)

Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
McAllen Intermediate School District
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School District
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
William Paterson University
William Paterson UniversityWilliam Paterson University
William Paterson University
 
503 reading quiz
503 reading quiz503 reading quiz
503 reading quiz
 
Bertamasya ke banda
Bertamasya ke bandaBertamasya ke banda
Bertamasya ke banda
 
Kelompok 9
Kelompok 9Kelompok 9
Kelompok 9
 

Similar to 2013 Cisco Annual Security Report

CCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas IlyadisCCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas IlyadisCloud Congress
 
Cymphonix Network Revealer for Real Time Bandwidth Monitoring
Cymphonix Network Revealer for Real Time Bandwidth MonitoringCymphonix Network Revealer for Real Time Bandwidth Monitoring
Cymphonix Network Revealer for Real Time Bandwidth MonitoringJulie Tangen
 
Financial Risks to Internet Security
Financial Risks to Internet SecurityFinancial Risks to Internet Security
Financial Risks to Internet SecuritySymantec
 
UC4 - One Automation
UC4 - One AutomationUC4 - One Automation
UC4 - One Automationk1k2sdad
 
S24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.veS24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.veHyTrust
 
Haydn shaughnessy on banks and ecosystems
Haydn shaughnessy on banks and ecosystemsHaydn shaughnessy on banks and ecosystems
Haydn shaughnessy on banks and ecosystemsHaydn Shaughnessy
 
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...NextVision Media
 
Protecting the identities of your website customers
Protecting the identities of your website customers Protecting the identities of your website customers
Protecting the identities of your website customers Symantec Website Security
 
Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Thomas Roider
 
Touchcom Sales Presentation
Touchcom Sales PresentationTouchcom Sales Presentation
Touchcom Sales Presentationewickline
 
Hp -DA-15dec2011
Hp -DA-15dec2011Hp -DA-15dec2011
Hp -DA-15dec2011Agora Group
 
Skelta Software Corporate Presentation
Skelta Software Corporate PresentationSkelta Software Corporate Presentation
Skelta Software Corporate PresentationSchneider Electric
 
Sprint - Cloud Services
Sprint - Cloud ServicesSprint - Cloud Services
Sprint - Cloud ServicesStephen Eilers
 

Similar to 2013 Cisco Annual Security Report (20)

CCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas IlyadisCCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas Ilyadis
 
Cymphonix Network Revealer for Real Time Bandwidth Monitoring
Cymphonix Network Revealer for Real Time Bandwidth MonitoringCymphonix Network Revealer for Real Time Bandwidth Monitoring
Cymphonix Network Revealer for Real Time Bandwidth Monitoring
 
Financial Risks to Internet Security
Financial Risks to Internet SecurityFinancial Risks to Internet Security
Financial Risks to Internet Security
 
Infographic: Mobixell Smooth DBRA
Infographic: Mobixell Smooth DBRAInfographic: Mobixell Smooth DBRA
Infographic: Mobixell Smooth DBRA
 
UC4 - One Automation
UC4 - One AutomationUC4 - One Automation
UC4 - One Automation
 
S24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.veS24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.ve
 
Haydn shaughnessy on banks and ecosystems
Haydn shaughnessy on banks and ecosystemsHaydn shaughnessy on banks and ecosystems
Haydn shaughnessy on banks and ecosystems
 
We present Bugscout
We present BugscoutWe present Bugscout
We present Bugscout
 
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
 
Digital Landscape
Digital LandscapeDigital Landscape
Digital Landscape
 
Hacking Trust
Hacking TrustHacking Trust
Hacking Trust
 
ComScore - State of the internet - Brazil
ComScore - State of the internet - BrazilComScore - State of the internet - Brazil
ComScore - State of the internet - Brazil
 
Protecting the identities of your website customers
Protecting the identities of your website customers Protecting the identities of your website customers
Protecting the identities of your website customers
 
Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Demandware tco webinar final 12122012
Demandware tco webinar final 12122012
 
SSMX SocialAirlines
SSMX SocialAirlinesSSMX SocialAirlines
SSMX SocialAirlines
 
Touchcom Sales Presentation
Touchcom Sales PresentationTouchcom Sales Presentation
Touchcom Sales Presentation
 
Discover SEM
Discover SEMDiscover SEM
Discover SEM
 
Hp -DA-15dec2011
Hp -DA-15dec2011Hp -DA-15dec2011
Hp -DA-15dec2011
 
Skelta Software Corporate Presentation
Skelta Software Corporate PresentationSkelta Software Corporate Presentation
Skelta Software Corporate Presentation
 
Sprint - Cloud Services
Sprint - Cloud ServicesSprint - Cloud Services
Sprint - Cloud Services
 

More from Cisco Security

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityCisco Security
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation FirewallCisco Security
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsCisco Security
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicCisco Security
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardCisco Security
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Cisco Security
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls InfographicCisco Security
 
Midyear Security Report Infographic
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report InfographicCisco Security
 
Cisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Security
 
City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCisco Security
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsCisco Security
 
Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataCisco Security
 

More from Cisco Security (15)

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
 
Midyear Security Report Infographic
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
 
Cisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report Infographic
 
City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
 

Recently uploaded

Apex Replay Debugger and Salesforce Platform Events.pptx
Apex Replay Debugger and Salesforce Platform Events.pptxApex Replay Debugger and Salesforce Platform Events.pptx
Apex Replay Debugger and Salesforce Platform Events.pptxmohayyudin7826
 
ASTRAZENECA. Knowledge Graphs Powering a Fast-moving Global Life Sciences Org...
ASTRAZENECA. Knowledge Graphs Powering a Fast-moving Global Life Sciences Org...ASTRAZENECA. Knowledge Graphs Powering a Fast-moving Global Life Sciences Org...
ASTRAZENECA. Knowledge Graphs Powering a Fast-moving Global Life Sciences Org...Neo4j
 
HBR SERIES METAL HOUSED RESISTORS POWER ELECTRICAL ABSORBS HIGH CURRENT DURIN...
HBR SERIES METAL HOUSED RESISTORS POWER ELECTRICAL ABSORBS HIGH CURRENT DURIN...HBR SERIES METAL HOUSED RESISTORS POWER ELECTRICAL ABSORBS HIGH CURRENT DURIN...
HBR SERIES METAL HOUSED RESISTORS POWER ELECTRICAL ABSORBS HIGH CURRENT DURIN...htrindia
 
How to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanHow to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanDatabarracks
 
"Platform Engineering with Development Containers", Igor Fesenko
"Platform Engineering with Development Containers", Igor Fesenko"Platform Engineering with Development Containers", Igor Fesenko
"Platform Engineering with Development Containers", Igor FesenkoFwdays
 
21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN
21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN
21ST CENTURY LITERACY FROM TRADITIONAL TO MODERNRonnelBaroc
 
Act Like an Owner, Challenge Like a VC by former CPO, Tripadvisor
Act Like an Owner,  Challenge Like a VC by former CPO, TripadvisorAct Like an Owner,  Challenge Like a VC by former CPO, Tripadvisor
Act Like an Owner, Challenge Like a VC by former CPO, TripadvisorProduct School
 
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, GoogleISPMAIndia
 
Cultivating Entrepreneurial Mindset in Product Management: Strategies for Suc...
Cultivating Entrepreneurial Mindset in Product Management: Strategies for Suc...Cultivating Entrepreneurial Mindset in Product Management: Strategies for Suc...
Cultivating Entrepreneurial Mindset in Product Management: Strategies for Suc...Product School
 
The Art of the Possible with Graph by Dr Jim Webber Neo4j.pptx
The Art of the Possible with Graph by Dr Jim Webber Neo4j.pptxThe Art of the Possible with Graph by Dr Jim Webber Neo4j.pptx
The Art of the Possible with Graph by Dr Jim Webber Neo4j.pptxNeo4j
 
Introduction to Multimodal LLMs with LLaVA
Introduction to Multimodal LLMs with LLaVAIntroduction to Multimodal LLMs with LLaVA
Introduction to Multimodal LLMs with LLaVARobert McDermott
 
From Challenger to Champion: How SpiraPlan Outperforms JIRA+Plugins
From Challenger to Champion: How SpiraPlan Outperforms JIRA+PluginsFrom Challenger to Champion: How SpiraPlan Outperforms JIRA+Plugins
From Challenger to Champion: How SpiraPlan Outperforms JIRA+PluginsInflectra
 
Leveraging SLF4j for Effective Logging in IBM App Connect Enterprise.docx
Leveraging SLF4j for Effective Logging in IBM App Connect Enterprise.docxLeveraging SLF4j for Effective Logging in IBM App Connect Enterprise.docx
Leveraging SLF4j for Effective Logging in IBM App Connect Enterprise.docxVotarikari Shravan
 
Confoo 2024 Gettings started with OpenAI and data science
Confoo 2024 Gettings started with OpenAI and data scienceConfoo 2024 Gettings started with OpenAI and data science
Confoo 2024 Gettings started with OpenAI and data scienceSusan Ibach
 
Synergy in Leadership and Product Excellence: A Blueprint for Growth by CPO, ...
Synergy in Leadership and Product Excellence: A Blueprint for Growth by CPO, ...Synergy in Leadership and Product Excellence: A Blueprint for Growth by CPO, ...
Synergy in Leadership and Product Excellence: A Blueprint for Growth by CPO, ...Product School
 
Are Human-generated Demonstrations Necessary for In-context Learning?
Are Human-generated Demonstrations Necessary for In-context Learning?Are Human-generated Demonstrations Necessary for In-context Learning?
Are Human-generated Demonstrations Necessary for In-context Learning?MENGSAYLOEM1
 
Automation Ops Series: Session 1 - Introduction and setup DevOps for UiPath p...
Automation Ops Series: Session 1 - Introduction and setup DevOps for UiPath p...Automation Ops Series: Session 1 - Introduction and setup DevOps for UiPath p...
Automation Ops Series: Session 1 - Introduction and setup DevOps for UiPath p...DianaGray10
 
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...UiPathCommunity
 
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...Adrian Sanabria
 
Progress Report: Ministry of IT under Dr. Umar Saif Aug 23-Feb'24
Progress Report: Ministry of IT under Dr. Umar Saif Aug 23-Feb'24Progress Report: Ministry of IT under Dr. Umar Saif Aug 23-Feb'24
Progress Report: Ministry of IT under Dr. Umar Saif Aug 23-Feb'24Umar Saif
 

Recently uploaded (20)

Apex Replay Debugger and Salesforce Platform Events.pptx
Apex Replay Debugger and Salesforce Platform Events.pptxApex Replay Debugger and Salesforce Platform Events.pptx
Apex Replay Debugger and Salesforce Platform Events.pptx
 
ASTRAZENECA. Knowledge Graphs Powering a Fast-moving Global Life Sciences Org...
ASTRAZENECA. Knowledge Graphs Powering a Fast-moving Global Life Sciences Org...ASTRAZENECA. Knowledge Graphs Powering a Fast-moving Global Life Sciences Org...
ASTRAZENECA. Knowledge Graphs Powering a Fast-moving Global Life Sciences Org...
 
HBR SERIES METAL HOUSED RESISTORS POWER ELECTRICAL ABSORBS HIGH CURRENT DURIN...
HBR SERIES METAL HOUSED RESISTORS POWER ELECTRICAL ABSORBS HIGH CURRENT DURIN...HBR SERIES METAL HOUSED RESISTORS POWER ELECTRICAL ABSORBS HIGH CURRENT DURIN...
HBR SERIES METAL HOUSED RESISTORS POWER ELECTRICAL ABSORBS HIGH CURRENT DURIN...
 
How to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanHow to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response Plan
 
"Platform Engineering with Development Containers", Igor Fesenko
"Platform Engineering with Development Containers", Igor Fesenko"Platform Engineering with Development Containers", Igor Fesenko
"Platform Engineering with Development Containers", Igor Fesenko
 
21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN
21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN
21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN
 
Act Like an Owner, Challenge Like a VC by former CPO, Tripadvisor
Act Like an Owner,  Challenge Like a VC by former CPO, TripadvisorAct Like an Owner,  Challenge Like a VC by former CPO, Tripadvisor
Act Like an Owner, Challenge Like a VC by former CPO, Tripadvisor
 
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
 
Cultivating Entrepreneurial Mindset in Product Management: Strategies for Suc...
Cultivating Entrepreneurial Mindset in Product Management: Strategies for Suc...Cultivating Entrepreneurial Mindset in Product Management: Strategies for Suc...
Cultivating Entrepreneurial Mindset in Product Management: Strategies for Suc...
 
The Art of the Possible with Graph by Dr Jim Webber Neo4j.pptx
The Art of the Possible with Graph by Dr Jim Webber Neo4j.pptxThe Art of the Possible with Graph by Dr Jim Webber Neo4j.pptx
The Art of the Possible with Graph by Dr Jim Webber Neo4j.pptx
 
Introduction to Multimodal LLMs with LLaVA
Introduction to Multimodal LLMs with LLaVAIntroduction to Multimodal LLMs with LLaVA
Introduction to Multimodal LLMs with LLaVA
 
From Challenger to Champion: How SpiraPlan Outperforms JIRA+Plugins
From Challenger to Champion: How SpiraPlan Outperforms JIRA+PluginsFrom Challenger to Champion: How SpiraPlan Outperforms JIRA+Plugins
From Challenger to Champion: How SpiraPlan Outperforms JIRA+Plugins
 
Leveraging SLF4j for Effective Logging in IBM App Connect Enterprise.docx
Leveraging SLF4j for Effective Logging in IBM App Connect Enterprise.docxLeveraging SLF4j for Effective Logging in IBM App Connect Enterprise.docx
Leveraging SLF4j for Effective Logging in IBM App Connect Enterprise.docx
 
Confoo 2024 Gettings started with OpenAI and data science
Confoo 2024 Gettings started with OpenAI and data scienceConfoo 2024 Gettings started with OpenAI and data science
Confoo 2024 Gettings started with OpenAI and data science
 
Synergy in Leadership and Product Excellence: A Blueprint for Growth by CPO, ...
Synergy in Leadership and Product Excellence: A Blueprint for Growth by CPO, ...Synergy in Leadership and Product Excellence: A Blueprint for Growth by CPO, ...
Synergy in Leadership and Product Excellence: A Blueprint for Growth by CPO, ...
 
Are Human-generated Demonstrations Necessary for In-context Learning?
Are Human-generated Demonstrations Necessary for In-context Learning?Are Human-generated Demonstrations Necessary for In-context Learning?
Are Human-generated Demonstrations Necessary for In-context Learning?
 
Automation Ops Series: Session 1 - Introduction and setup DevOps for UiPath p...
Automation Ops Series: Session 1 - Introduction and setup DevOps for UiPath p...Automation Ops Series: Session 1 - Introduction and setup DevOps for UiPath p...
Automation Ops Series: Session 1 - Introduction and setup DevOps for UiPath p...
 
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
 
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
 
Progress Report: Ministry of IT under Dr. Umar Saif Aug 23-Feb'24
Progress Report: Ministry of IT under Dr. Umar Saif Aug 23-Feb'24Progress Report: Ministry of IT under Dr. Umar Saif Aug 23-Feb'24
Progress Report: Ministry of IT under Dr. Umar Saif Aug 23-Feb'24
 

2013 Cisco Annual Security Report

  • 1. Cisco Security Intelligence Annual Security Report & Cisco Connected World Technology Report
  • 2. 13BWEB REQUESTS 150M GLOBALLY DEPLOYED ENDPOINTS 35% WORLDWIDE EMAIL TRAFFIC 75 TB DATA RECEIVED PER DAY 1.6M GLOBALLY DEPLOYED DEVICES SensorBase Threat Operations Center Dynamic Updates © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. 36% 22% Online video search engines 20% 13% Social networks Advertisements Hits to Top Web Properties Social Network Ads Online Video Search Engine 0% 10% 20% 30% 40% © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. Search Engines vs. Counterfeit Software 27x more likely to deliver malicious content Online Advertisements vs. Pornography 182x more likely to deliver malicious content Online Shopping vs. Counterfeit Software 21x more likely to deliver malicious content © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5. 90% Perscription Drugs Prescription Drugs 80% Luxury Watches Luxury Watches Credit Card Credit Card 70% Business Reviews Business Reviews Professional Network 60% Professional Network Electronic Money Transfer Electronic Money Transfer Accounting Software 50% Accounting Software Social Network Social Network Professional Associations 40% Professional Associations Airline Airline 30% Mail Mail Weight Loss Weight Loss Government Organization 20% Government Organization Windows Software 10% Windows Software Cellular Company Cellular Company Online Classifieds 0% Taxes Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. APRIL 15 January-March: February-April: January-March and Windows Software Tax software spam during September-December: spam, which coincided with U.S. tax season. Spam based on Professional the release of the Microsoft networks like Windows 8 consumer LinkedIn, correlated with preview desire for a change in career during the beginning and end of the year. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. Scandinavia on the Rise | 8 of Top 10 Countries in EMEA The Web is an equal-opportunity infector 33% of all web malware Russia, Denmark, and Sweden encounters resulted from were virtually tied for second place domains hosted in the U.S. Denmark 9.55% Russia 9.79% Sweden United States 9.27% 33% © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8. The Bigger the Company… Up to 2 ½ times more risk of encountering Web malware for large organizations All sizes of companies experience significant risk © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. Downloader 1.12% Worm 0.89% Infostealing 3.49% Virus 0.48% Mobile 0.42% Exploit 9.86% Scareware 0.16% Malscript/Iframe 83.43% © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. Android Mobile Device Trending Android Malware grows 2577% over 2012 .5% Mobile make up less than .5% of total web malware encounters © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. Global spam volumes down 18% in 2012 with spammers keeping banker’s hours for a 25% drop over the weekend 1. India India retains spam crown, 2. United States U.S. skyrockets into 3. Korea 4. China second position 5. Vietnam 6. Russia 7. Brazil 8. Saudi Arabia 9. Taiwan © 2013 Cisco and/or its affiliates. All rights reserved. 10. Poland Cisco Confidential 11
  • 12. 862% Over growth in IPv6 email messages Only 171% growth in IPv6 spam © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. The Threat Landscape And the Next-gen Workforce A New Dawn for Work, Play, & Privacy
  • 14. Timing and Sample Qualifications THE THIRD ANNUAL CISCO CONNECTED WORLD TECHNOLOGY REPORT 1800 1800 COLLEGE STUDENTS INFORMATION TECHNOLOGY and WORKERS PROFESSIONALS Ages 18 to 30 The survey was translated into local languages and conducted in August 2012 across 18 countries to gain at least 100 completes for each subgroup in each country 18 Countries: United States, Canada, Mexico, Brazil, Argentina, United Kingdom, France, Germany, Netherlands, Russia, Poland, Turkey, South Africa, Korea, India, China, Japan, Australia © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
  • 15. On average, Gen Y uses 2 to 3 Internet devices, such as laptops, tablets, PCs, smartphones Nearly 3 out of 5 say Internet browsing should be strictly private at work and at home… TEXT …Yet nearly 91% believe the age of online privacy is over. 1 in 10 Gen Y have so many passwords they lose count and forget them regularly. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
  • 16. Globally 91% of global millennials feel that the age of privacy is over. However, one third of the respondents are not worried about all the data that is stored and captured about them. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
  • 17. Employers vs. Employees Is it okay for employers to track employee Internet No activities if they are using a company device? 66% Yes 34% © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
  • 18. Employers vs. Employees 1 in 5 say “my employer tracks internet use on company-owned PC’s, laptops, smartphones” ? Over 1 in 4 don’t know if their Internet usage is being tracked © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. 2 in 5 Gen Y Internet browsing should be strictly private Over 1/3 It’s okay only if I give permission first © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 20. 57% 90% will share email address to get discounts and sale notices shop online 3 out of 5 rely on customer reviews for online shopping But 75% do not trust most internet sites to keep data secure © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  • 21. GEN Y AVERAGE: 2 to 3 devices Almost half use 2 devices 1 device 2 devices 3 devices 4 devices 5 or more 17% 46% 29% 6% 2% © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
  • 22. Over 25% 1 in 10 use 5 to 9 passwords have so many passwords they have lost count! CaTxx123! catxx3210 dogxx321 ! Catxx321 Catxx321 X325*1 1358acds ? CaTxx123! CaTxx123! dogxx321 1358acds 1358acds catxx3210 X325*1 orange321 X325*1 ABC123! X325*1 ABC123! 1358acds 1358acds catXX12! catXX12! 1358acds Catxx321 catxx3210 barker357! barker357! Catxx321 barker357! CaTxx123! catXX12! Catxx321 dogxx321 dogxx321 dogxx321 dogxx321 CaTxx123! barker357! dogxx321 barker357! ABC123! barker357! ABC123! © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  • 23. Online Identity over 1/3 believe 4 5 out of (81%) “most people have completely different online vs. offline identities” Believe people have different online and less than offline identities 50% say “my online and offline identities are the same” © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
  • 24. Disconnect with corporate IT 40% say that company policy forbids using company-owned devices for personal activities. 71% don’t obey policies, almost 3 out of 4 50% of IT professionals believe: “our employees obey the policies on personal use” © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24

Editor's Notes

  1. Most Generation Y employees believe the age of privacy is over (91%), but one third say that they are not worried about all the data that is stored and captured about them. Tradeoffs are being made as people get more convenience and experience out of the online world – either through simple communications like email and texting to more complex and open communications like social media and online consumerism – at the expense of sharing more information about their lives and lifestyles, and they do not like it. Aside from a couple countries, 16 of 18 featured more than half of their respondent pools saying they are uncomfortable with this loss of privacy and exposure of personal information (and yet they still engage in online activity like social media, online shopping, etc.) MEX (76%) and KOR (75%) exhibited the highest rate of concern about relinquishing privacy and identity online, an interesting finding being that both countries were some of the more prominent ones in social media and online activity. Only one in three (33%) millennials are fine with this trend and tradeoff, with TUR (57%) being the only nation that featured a majority of respondents being comfortable with this tradeoff in privacy and online experience. Does the world really understand what it is getting into with regard to online activity? Interestingly, NED, which has been the relatively conservative country in the study, revealed one in five millennial respondents (20%) believing that the age of privacy was not waning.