Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The Top 7 Causes of Major Security Breaches


Published on

In these times where North American companies are under constant cyber-attack, can you afford to underestimate the disaster that a security breach could cause on your organization?

Your organization's leadership has entrusted your team with the company's cyber security, and this includes ensuring that user data is safe and their productivity isn't compromised.

Join our panel of experts (Alex Brandt, who brings 19 years of hands-on expertise in the IT space, and Cynthia James, a security expert with over 25 years in the industry) as they discuss the 7 biggest reasons that business security gets compromised (and what you can do about it).

These include:

The threat of increased employee mobility
Managing BYOD
Perimeter-less networks
The best way to reduce human error
And MUCH more...
Stick around until the end and gain the visibility you need to uncover security holes before they become major disasters and put your organization and (even worse) your job at risk.

Published in: Technology, Business
  • Be the first to comment

The Top 7 Causes of Major Security Breaches

  1. 1. The Top 7 Causes of MajorSecurity Breaches
  2. 2. Meet Our SpeakersCynthia JamesDirector Business Development, CISSPJason DettbarnSenior Technology StrategistModerator:Alex BrandtVP Americas
  3. 3. The Power of Layered Security
  4. 4. • Founded in 1997; largest private anti-malware company –100% focused on anti-malware• Over $700M annual revenues• Presence in 19 countries• #1 vendor in Germany, France, Spain, Eastern Europe• Protecting over 300 million end pointsAbout our Expert Speakers:Kaspersky
  5. 5. Today’s Agenda The Cybercrime Comprehension Gap The Top 7 Causes of Security Breaches 5 Cybercrime Facts People Don’t Know Security Solution Overview 3 Tips for CyberSafety at Home Giveaway Questions & Answers
  6. 6. • 200k unique malware samples PER YEAR wereidentified in 2006; 2M in 2007…now it’s up to 200Kmalware samples PER DAY.• The quality of malware improves every year.| June 5, 2013PAGE 6 |Cybercrime Threatscape:Malware Growth
  7. 7. • Recent years have seen exponential growth in malware.• Anyone can enter the cybercrime game.• Cybercriminals earn over $100B a year.• Cybercrime will never stop.The Current MalwareComprehension Gap| June 5, 2013Kaspersky Lab PresentationPAGE 7 |Where most employees/end usersthink we still areWhere we reallyare today (2013)Over 200KPer DAY
  8. 8. #1: End User Error & Malice
  9. 9. #2: There’s No Perimeter to Protect
  10. 10. #3: Mobile Devices Are IdealEntry Points
  11. 11. Speaking of MobileThreats…the Latest Malware is downloaded based on the device/platform “Crackers” are widely available: open app, insert malware,repost it Google removed 100 malicious apps from their store…butnot before one was downloaded 260K times Mobile malware steals transaction authentication numbersassociated with banking + personal data Advertisers receive the same information we provide theapp (geolocation apps for example)
  12. 12. #4: Loss of Mobile Devices
  13. 13. #5: Lack of Layered Defense
  14. 14. #6: Cybercriminals Are VastlyUnderestimated
  15. 15. #7: Users Don’t Keep Up WithNew Tactics
  16. 16. 1. (Incredible volume; low barrier to entry;earnings are huge)2. 60% of companies take 3 monthsor longer to discover they were breached3. First cell phone botnet was discovered in 20124. AV is not a product, and all AV is not created equal5. 80% of burglars use Facebook and personalwebsites to select victims5 Facts 90% of people don’tknow about cybercrime
  17. 17. 1. End User error or malice2. There’s no perimeter to protect3. Mobile devices are ideal entry points4. Loss of mobile devices (mobile workforce)5. Lack of layered defense (patching, end point AV,gateway AV, policy enforcement)6. Cybercriminals are vastly underestimated7. Users don’t keep up on new tacticsThe Top Seven
  18. 18. Layered Security:Let’s Take a Look…
  19. 19.  1. Personal banking: ATM skimming on the rise(cover the keypad) Log on after your AV is updated 2. Never use an unknown USB!!! 3. Turn off geolocators on kids’ cell phones3 Tips for Home CyberSafety| June 5, 2013Kaspersky Lab PresentationPAGE 19 |
  20. 20. Conclusion: Layered Security withKaseya & Kaspersky
  21. 21.  Kaspersky KLAB Digest IT- Free Security Bulletin Free Kaseya Security Bundle TrialSpecial Giveaways| June 5, 2013Kaspersky Lab PresentationPAGE 21 |Interested? Just respond to the Poll located on theright bottom corner of your Webex platform!
  22. 22. Industry standard forIT automationSolutions & ServicesWho are we?
  23. 23. Our solutions empower people toproactively manage and controlIT assets remotely, easily andefficiently from one integratedWeb-based platformWho are we?
  24. 24. Why Kaseya?A single Kaseya user can proactivelymanage 1,000s of automated ITsystems tasks in the same amount oftime required by a team of techniciansusing other techniques.
  25. 25.
  26. 26. Discover the State of IT• Systems• Assets• Mobile Devices• Network DevicesManage the State of IT• Scheduling• Procedures• API/MessagingAutomate the State ofIT• Reporting• Dashboards• Interactive Data ViewsIT Configuration ManagementAsset ManagementSecurityBusiness ContinuityService DeliverySystems Monitoring• Remote Management• Software Deployment• Power Management• Image Deployment• Desktop Migration• Mobile Device Management• Network Discover & AD• Hardware/Software• Asset Management• Virtual Machine Management• AntiVirus• AntiMalware• Patch Management• Software Updates• Image Backup• Image Virtualization• File & Folder Backup• Service Desk/Ticketing• Policy Management• Service Billing• Policy Compliance• Time Tracking• Systems Checks & Alerts• Agent Monitoring• Enterprise Monitoring• Agent-less Monitoring• Log MonitoringUNIFIED MANAGEMENT
  27. 27. www.kaseya.comOur Vision“Providing Enterprise-Class IT SystemsManagement for Everybody”
  28. 28. Q&A & ResourcesCynthia JamesDirector Business Development, CISSPJason DettbarnSenior Technology StrategistJoin Us:Sign Up for a Demo! us:1 (877) 926-0001sales@kaseya.comLearn