Successfully reported this slideshow.

Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME IN AMERICA AND IN 2014 1 IN 7 WILL BE VICTIMS

2

Share

Loading in …3
×
1 of 32
1 of 32

Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME IN AMERICA AND IN 2014 1 IN 7 WILL BE VICTIMS

2

Share

(Companion whitepaper here:
http://blog.securityprivateers.com/2014/03/lessons-from-frog-and-ostrich.html )

CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME IN AMERICA AND IN 2014 1 IN 7 WILL BE VICTIMS
Part 1
Target: Retail Credit Card Thefts, Frogs, Ostriches and the barn door: Why we will continue to see credit card thefts.
TJMAX had a major breach in 2005 and didn’t know about for 18 months. The same fundamental problems caused the recent Target breach and will continue to plague government, retail and brick and mortar networks for years to come. Find out why a frog won’t let itself get boiled, and learn why humans are the only ones silly enough to bury their heads in the sand as we look at the core problems facing these institutions today.
Part 2
“I am a small company or just an individual, what do hackers want from me and how do they get it?”.
Think you are safe? You have nothing to lose? Nothing the hackers want? Think again. Turn every computer system you own off or use for 7 days and tell me you have nothing valuable. Hackers are after anything they can sell, from your list of customers to your web browser ‘favorites’ list. Find out several simple steps you can take to keep the hackers (and the government) out of your business.

(Companion whitepaper here:
http://blog.securityprivateers.com/2014/03/lessons-from-frog-and-ostrich.html )

CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME IN AMERICA AND IN 2014 1 IN 7 WILL BE VICTIMS
Part 1
Target: Retail Credit Card Thefts, Frogs, Ostriches and the barn door: Why we will continue to see credit card thefts.
TJMAX had a major breach in 2005 and didn’t know about for 18 months. The same fundamental problems caused the recent Target breach and will continue to plague government, retail and brick and mortar networks for years to come. Find out why a frog won’t let itself get boiled, and learn why humans are the only ones silly enough to bury their heads in the sand as we look at the core problems facing these institutions today.
Part 2
“I am a small company or just an individual, what do hackers want from me and how do they get it?”.
Think you are safe? You have nothing to lose? Nothing the hackers want? Think again. Turn every computer system you own off or use for 7 days and tell me you have nothing valuable. Hackers are after anything they can sell, from your list of customers to your web browser ‘favorites’ list. Find out several simple steps you can take to keep the hackers (and the government) out of your business.

More Related Content

Similar to Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME IN AMERICA AND IN 2014 1 IN 7 WILL BE VICTIMS

Related Books

Free with a 30 day trial from Scribd

See all

×