SlideShare a Scribd company logo
Cisco Security Intelligence
Annual Security Report &
Cisco Connected World Technology Report
13BWEB REQUESTS
                                                            150M
                                                             GLOBALLY DEPLOYED ENDPOINTS
                                                                                           35%
                                                                                           WORLDWIDE EMAIL TRAFFIC




                                  75 TB
                                   DATA RECEIVED PER DAY
                                                                                1.6M
                                                                                 GLOBALLY DEPLOYED DEVICES




              SensorBase                                   Threat Operations Center             Dynamic Updates


© 2013 Cisco and/or its affiliates. All rights reserved.                                                      Cisco Confidential   2
36%
      22%
       Online video
                                                      search engines
                                                                        20%                         13%
                                                                       Social networks          Advertisements




                                                                                           Hits to Top Web Properties

                                                                              Social Network

                                                                                        Ads

                                                                                Online Video

                                                                              Search Engine

                                                                                               0%   10%      20%        30%             40%


© 2013 Cisco and/or its affiliates. All rights reserved.                                                                Cisco Confidential    3
Search Engines vs. Counterfeit Software

                                                    27x more likely to deliver malicious content
                                                    Online Advertisements vs. Pornography

                                                    182x more likely to deliver malicious content
                                                    Online Shopping vs. Counterfeit Software

                                                    21x more likely to deliver malicious content
© 2013 Cisco and/or its affiliates. All rights reserved.                                       Cisco Confidential   4
90%
                                                                                                                 Perscription Drugs
                                                                                                                 Prescription Drugs
   80%                                                                                                           Luxury Watches
                                                                                                                 Luxury Watches
                                                                                                                 Credit Card
                                                                                                                 Credit Card
   70%
                                                                                                                 Business Reviews
                                                                                                                 Business Reviews
                                                                                                                 Professional Network
   60%                                                                                                           Professional Network
                                                                                                                 Electronic Money Transfer
                                                                                                                 Electronic Money Transfer
                                                                                                                 Accounting Software
   50%                                                                                                           Accounting Software
                                                                                                                 Social Network
                                                                                                                 Social Network
                                                                                                                 Professional Associations
   40%                                                                                                           Professional Associations
                                                                                                                 Airline
                                                                                                                 Airline
   30%                                                                                                           Mail
                                                                                                                 Mail
                                                                                                                 Weight Loss
                                                                                                                 Weight Loss
                                                                                                                 Government Organization
   20%
                                                                                                                 Government Organization
                                                                                                                 Windows Software
   10%                                                                                                           Windows Software
                                                                                                                 Cellular Company
                                                                                                                 Cellular Company
                                                                                                                 Online Classifieds
     0%                                                                                                          Taxes
           Jan              Feb              Mar           Apr   May   Jun   Jul   Aug   Sep   Oct   Nov   Dec




© 2013 Cisco and/or its affiliates. All rights reserved.                                                                     Cisco Confidential   5
APRIL

                                                                  15
 January-March:                                            February-April:            January-March and
 Windows Software                                          Tax software spam during   September-December:
 spam, which coincided with                                U.S. tax season.           Spam based on Professional
 the release of the Microsoft                                                         networks like
 Windows 8 consumer                                                                   LinkedIn, correlated with
 preview                                                                              desire for a change in career
                                                                                      during the beginning and end
                                                                                      of the year.
© 2013 Cisco and/or its affiliates. All rights reserved.                                                 Cisco Confidential   6
Scandinavia on the Rise | 8 of Top 10 Countries in EMEA


    The Web is an equal-opportunity infector
       33% of all web malware                              Russia, Denmark, and Sweden
       encounters resulted from                            were virtually tied for second place
       domains hosted in the U.S.
                                                                    Denmark
                                                                     9.55%

                                                                              Russia
                                                                               9.79%
                                                                 Sweden
                    United States                                 9.27%

                        33%




© 2013 Cisco and/or its affiliates. All rights reserved.                                Cisco Confidential   7
The Bigger the Company…



                                                           Up to 2 ½ times more risk
                                                           of encountering Web malware
                                                            for large organizations

                                                                                     All sizes of companies
                                                                                     experience significant risk




© 2013 Cisco and/or its affiliates. All rights reserved.                                                Cisco Confidential   8
Downloader 1.12%                           Worm 0.89%

              Infostealing 3.49%                            Virus 0.48%
                                                               Mobile 0.42%
                  Exploit 9.86%
                                                               Scareware 0.16%




               Malscript/Iframe
                       83.43%




© 2013 Cisco and/or its affiliates. All rights reserved.                  Cisco Confidential   9
Android Mobile Device Trending




                                                           Android Malware grows




                                                           2577%                   over 2012

                                                                 .5%
       Mobile make up less
       than .5% of total web
       malware encounters


© 2013 Cisco and/or its affiliates. All rights reserved.                                       Cisco Confidential   10
Global spam volumes down 18%
                                                     in 2012

                                                     with spammers keeping banker’s hours for a
                                                     25% drop over the weekend

                                                                                  1. India
                  India retains spam crown,                                       2. United States
      U.S. skyrockets into                                                        3. Korea
                                                                                  4. China
      second position                                                             5. Vietnam
                                                                                  6. Russia
                                                                                  7. Brazil
                                                                                  8. Saudi Arabia
                                                                                  9. Taiwan
© 2013 Cisco and/or its affiliates. All rights reserved.                          10. Poland         Cisco Confidential   11
862%
                         Over
                                                           growth in IPv6 email messages




                         Only



                                            171%           growth in IPv6 spam




© 2013 Cisco and/or its affiliates. All rights reserved.                         Cisco Confidential   12
The Threat Landscape
And the Next-gen Workforce
A New Dawn for Work, Play, & Privacy
Timing and Sample Qualifications

                   THE THIRD ANNUAL CISCO CONNECTED WORLD TECHNOLOGY REPORT




1800                                                                            1800
  COLLEGE STUDENTS                                                INFORMATION TECHNOLOGY
  and WORKERS                                                     PROFESSIONALS
  Ages 18 to 30


  The survey was translated into local languages and conducted in August 2012 across 18 countries to
  gain at least 100 completes for each subgroup in each country
  18 Countries: United States, Canada, Mexico, Brazil, Argentina, United
  Kingdom, France, Germany, Netherlands, Russia, Poland, Turkey, South
  Africa, Korea, India, China, Japan, Australia
© 2013 Cisco and/or its affiliates. All rights reserved.                                      Cisco Confidential   14
On average, Gen Y uses 2 to 3 Internet
      devices, such as
      laptops, tablets, PCs, smartphones

      Nearly 3 out of 5 say Internet
      browsing should be strictly private at
      work and at home…                                    TEXT

      …Yet nearly 91% believe the age of
      online privacy is over.



      1 in 10 Gen Y have so many
      passwords they lose count and
      forget them regularly.
© 2013 Cisco and/or its affiliates. All rights reserved.          Cisco Confidential   15
Globally 91% of
     global millennials
     feel that the age of
     privacy is over.
     However, one third
     of the respondents
     are not worried
     about all the data
     that is stored and
     captured about them.
© 2013 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   16
Employers vs. Employees




                                                                 Is it okay for employers to
                                                                 track employee Internet
             No                                                  activities if they are using
                                                                 a company device?
            66%
                                                           Yes
                                                           34%
© 2013 Cisco and/or its affiliates. All rights reserved.                                 Cisco Confidential   17
Employers vs. Employees



                                                           1 in 5
                                                           say “my employer tracks internet use
                                                           on company-owned
                                                           PC’s, laptops, smartphones”


                       ?
                                                           Over 1 in 4
                                                           don’t know if their Internet usage
                                                           is being tracked


© 2013 Cisco and/or its affiliates. All rights reserved.                                    Cisco Confidential   18
2 in 5 Gen Y
                                                           Internet browsing should be
                                                           strictly private




                                                           Over 1/3
                                                           It’s okay only if I give permission first


© 2013 Cisco and/or its affiliates. All rights reserved.                                     Cisco Confidential   19
57%

                    90%
                                                           will share email address to get
                                                           discounts and sale notices


                                      shop online          3 out of 5
                                                           rely on customer reviews for
                                                           online shopping


                                                           But 75%
                                                           do not trust most internet
                                                           sites to keep data secure

© 2013 Cisco and/or its affiliates. All rights reserved.                            Cisco Confidential   20
GEN Y AVERAGE:
                                                            2 to 3 devices

           Almost half use 2 devices
                      1 device                             2 devices   3 devices   4 devices   5 or more
                      17%                                  46%         29%          6%          2%

© 2013 Cisco and/or its affiliates. All rights reserved.                                            Cisco Confidential   21
Over 25%                                                        1 in 10
        use 5 to 9 passwords                                            have so many passwords
                                                                        they have lost count!
                                                                           CaTxx123!
                                                                         catxx3210            dogxx321
                                        !                  Catxx321
                                                                            Catxx321
                                                                        X325*1
                                                                             1358acds
                                                                                       ?   CaTxx123!
                                                                                            CaTxx123!
                                                                                                dogxx321
                                                                                           1358acds
                                                                                              1358acds
                                                           catxx3210               X325*1
                                                                           orange321          X325*1
                                                                          ABC123!          X325*1
                                                                          ABC123! 1358acds      1358acds
                                                           catXX12!    catXX12!          1358acds
                                                                                            Catxx321
                                                                          catxx3210
                                                                                barker357!
                                                                                       barker357!
                                                                             Catxx321         barker357!
                                                           CaTxx123!     catXX12! Catxx321
                                                                                    dogxx321       dogxx321
                                                                       dogxx321            dogxx321
                                                                            CaTxx123!      barker357!
                                                           dogxx321                 barker357! ABC123!
                                                                           barker357! ABC123!

© 2013 Cisco and/or its affiliates. All rights reserved.                                          Cisco Confidential   22
Online Identity


                                                             over     1/3 believe
              4 5                     out of
                                  (81%)
                                                           “most people have completely
                                                                                 different
                                                                        online vs. offline
                                                                               identities”
      Believe people have
      different online and                                               less than
      offline identities
                                                                        50% say
                                                                   “my online and offline
                                                                 identities are the same”

© 2013 Cisco and/or its affiliates. All rights reserved.                           Cisco Confidential   23
Disconnect with corporate IT



     40%
     say that company policy forbids
     using company-owned devices for
     personal activities.


  71%                                                      don’t obey policies, almost 3 out of 4



  50%         of IT professionals believe:
    “our employees obey the policies on personal use”

© 2013 Cisco and/or its affiliates. All rights reserved.                                            Cisco Confidential   24

More Related Content

Viewers also liked

Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
Cisco Security
 
McAllen Intermediate School District
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School District
Cisco Security
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
Cisco Security
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
Cisco Security
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
Cisco Security
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
Cisco Security
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
Cisco Security
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
Cisco Security
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
Cisco Security
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
Cisco Security
 
William Paterson University
William Paterson UniversityWilliam Paterson University
William Paterson University
Cisco Security
 
503 reading quiz
503 reading quiz503 reading quiz
503 reading quizamybass
 
Bertamasya ke banda
Bertamasya ke bandaBertamasya ke banda
Bertamasya ke bandaArya Ningrat
 

Viewers also liked (14)

Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
McAllen Intermediate School District
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School District
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
William Paterson University
William Paterson UniversityWilliam Paterson University
William Paterson University
 
503 reading quiz
503 reading quiz503 reading quiz
503 reading quiz
 
Bertamasya ke banda
Bertamasya ke bandaBertamasya ke banda
Bertamasya ke banda
 
Kelompok 9
Kelompok 9Kelompok 9
Kelompok 9
 

Similar to 2013 Cisco Annual Security Report

CCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas IlyadisCCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas Ilyadis
Cloud Congress
 
Cymphonix Network Revealer for Real Time Bandwidth Monitoring
Cymphonix Network Revealer for Real Time Bandwidth MonitoringCymphonix Network Revealer for Real Time Bandwidth Monitoring
Cymphonix Network Revealer for Real Time Bandwidth Monitoring
Julie Tangen
 
Financial Risks to Internet Security
Financial Risks to Internet SecurityFinancial Risks to Internet Security
Financial Risks to Internet Security
Symantec
 
Infographic: Mobixell Smooth DBRA
Infographic: Mobixell Smooth DBRAInfographic: Mobixell Smooth DBRA
Infographic: Mobixell Smooth DBRA
sethgreenbergslideshare
 
UC4 - One Automation
UC4 - One AutomationUC4 - One Automation
UC4 - One Automationk1k2sdad
 
S24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.veS24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.veHyTrust
 
Haydn shaughnessy on banks and ecosystems
Haydn shaughnessy on banks and ecosystemsHaydn shaughnessy on banks and ecosystems
Haydn shaughnessy on banks and ecosystemsHaydn Shaughnessy
 
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
NextVision Media
 
Digital Landscape
Digital LandscapeDigital Landscape
Digital Landscape
Mahesh Patwardhan
 
ComScore - State of the internet - Brazil
ComScore - State of the internet - BrazilComScore - State of the internet - Brazil
ComScore - State of the internet - Brazil
Diego Túlio Tomaz Gomes
 
Protecting the identities of your website customers
Protecting the identities of your website customers Protecting the identities of your website customers
Protecting the identities of your website customers
Symantec Website Security
 
Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Thomas Roider
 
Touchcom Sales Presentation
Touchcom Sales PresentationTouchcom Sales Presentation
Touchcom Sales Presentationewickline
 
Discover SEM
Discover SEMDiscover SEM
Discover SEM
Jon Gatrell
 
Hp -DA-15dec2011
Hp -DA-15dec2011Hp -DA-15dec2011
Hp -DA-15dec2011Agora Group
 
Skelta Software Corporate Presentation
Skelta Software Corporate PresentationSkelta Software Corporate Presentation
Skelta Software Corporate Presentation
Schneider Electric
 
Sprint - Cloud Services
Sprint - Cloud ServicesSprint - Cloud Services
Sprint - Cloud Services
Stephen Eilers
 

Similar to 2013 Cisco Annual Security Report (20)

CCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas IlyadisCCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas Ilyadis
 
Cymphonix Network Revealer for Real Time Bandwidth Monitoring
Cymphonix Network Revealer for Real Time Bandwidth MonitoringCymphonix Network Revealer for Real Time Bandwidth Monitoring
Cymphonix Network Revealer for Real Time Bandwidth Monitoring
 
Financial Risks to Internet Security
Financial Risks to Internet SecurityFinancial Risks to Internet Security
Financial Risks to Internet Security
 
Infographic: Mobixell Smooth DBRA
Infographic: Mobixell Smooth DBRAInfographic: Mobixell Smooth DBRA
Infographic: Mobixell Smooth DBRA
 
UC4 - One Automation
UC4 - One AutomationUC4 - One Automation
UC4 - One Automation
 
S24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.veS24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.ve
 
Haydn shaughnessy on banks and ecosystems
Haydn shaughnessy on banks and ecosystemsHaydn shaughnessy on banks and ecosystems
Haydn shaughnessy on banks and ecosystems
 
We present Bugscout
We present BugscoutWe present Bugscout
We present Bugscout
 
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
 
Digital Landscape
Digital LandscapeDigital Landscape
Digital Landscape
 
Hacking Trust
Hacking TrustHacking Trust
Hacking Trust
 
ComScore - State of the internet - Brazil
ComScore - State of the internet - BrazilComScore - State of the internet - Brazil
ComScore - State of the internet - Brazil
 
Protecting the identities of your website customers
Protecting the identities of your website customers Protecting the identities of your website customers
Protecting the identities of your website customers
 
Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Demandware tco webinar final 12122012
Demandware tco webinar final 12122012
 
SSMX SocialAirlines
SSMX SocialAirlinesSSMX SocialAirlines
SSMX SocialAirlines
 
Touchcom Sales Presentation
Touchcom Sales PresentationTouchcom Sales Presentation
Touchcom Sales Presentation
 
Discover SEM
Discover SEMDiscover SEM
Discover SEM
 
Hp -DA-15dec2011
Hp -DA-15dec2011Hp -DA-15dec2011
Hp -DA-15dec2011
 
Skelta Software Corporate Presentation
Skelta Software Corporate PresentationSkelta Software Corporate Presentation
Skelta Software Corporate Presentation
 
Sprint - Cloud Services
Sprint - Cloud ServicesSprint - Cloud Services
Sprint - Cloud Services
 

More from Cisco Security

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
Cisco Security
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
Cisco Security
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
Cisco Security
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
Cisco Security
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
Cisco Security
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Cisco Security
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
Cisco Security
 
String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
Cisco Security
 
Midyear Security Report Infographic
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
Cisco Security
 
Cisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report Infographic
Cisco Security
 
City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
Cisco Security
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security
 
Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
Cisco Security
 

More from Cisco Security (15)

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
 
Midyear Security Report Infographic
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
 
Cisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report Infographic
 
City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
 

Recently uploaded

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

2013 Cisco Annual Security Report

  • 1. Cisco Security Intelligence Annual Security Report & Cisco Connected World Technology Report
  • 2. 13BWEB REQUESTS 150M GLOBALLY DEPLOYED ENDPOINTS 35% WORLDWIDE EMAIL TRAFFIC 75 TB DATA RECEIVED PER DAY 1.6M GLOBALLY DEPLOYED DEVICES SensorBase Threat Operations Center Dynamic Updates © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. 36% 22% Online video search engines 20% 13% Social networks Advertisements Hits to Top Web Properties Social Network Ads Online Video Search Engine 0% 10% 20% 30% 40% © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. Search Engines vs. Counterfeit Software 27x more likely to deliver malicious content Online Advertisements vs. Pornography 182x more likely to deliver malicious content Online Shopping vs. Counterfeit Software 21x more likely to deliver malicious content © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5. 90% Perscription Drugs Prescription Drugs 80% Luxury Watches Luxury Watches Credit Card Credit Card 70% Business Reviews Business Reviews Professional Network 60% Professional Network Electronic Money Transfer Electronic Money Transfer Accounting Software 50% Accounting Software Social Network Social Network Professional Associations 40% Professional Associations Airline Airline 30% Mail Mail Weight Loss Weight Loss Government Organization 20% Government Organization Windows Software 10% Windows Software Cellular Company Cellular Company Online Classifieds 0% Taxes Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. APRIL 15 January-March: February-April: January-March and Windows Software Tax software spam during September-December: spam, which coincided with U.S. tax season. Spam based on Professional the release of the Microsoft networks like Windows 8 consumer LinkedIn, correlated with preview desire for a change in career during the beginning and end of the year. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. Scandinavia on the Rise | 8 of Top 10 Countries in EMEA The Web is an equal-opportunity infector 33% of all web malware Russia, Denmark, and Sweden encounters resulted from were virtually tied for second place domains hosted in the U.S. Denmark 9.55% Russia 9.79% Sweden United States 9.27% 33% © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8. The Bigger the Company… Up to 2 ½ times more risk of encountering Web malware for large organizations All sizes of companies experience significant risk © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. Downloader 1.12% Worm 0.89% Infostealing 3.49% Virus 0.48% Mobile 0.42% Exploit 9.86% Scareware 0.16% Malscript/Iframe 83.43% © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. Android Mobile Device Trending Android Malware grows 2577% over 2012 .5% Mobile make up less than .5% of total web malware encounters © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. Global spam volumes down 18% in 2012 with spammers keeping banker’s hours for a 25% drop over the weekend 1. India India retains spam crown, 2. United States U.S. skyrockets into 3. Korea 4. China second position 5. Vietnam 6. Russia 7. Brazil 8. Saudi Arabia 9. Taiwan © 2013 Cisco and/or its affiliates. All rights reserved. 10. Poland Cisco Confidential 11
  • 12. 862% Over growth in IPv6 email messages Only 171% growth in IPv6 spam © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. The Threat Landscape And the Next-gen Workforce A New Dawn for Work, Play, & Privacy
  • 14. Timing and Sample Qualifications THE THIRD ANNUAL CISCO CONNECTED WORLD TECHNOLOGY REPORT 1800 1800 COLLEGE STUDENTS INFORMATION TECHNOLOGY and WORKERS PROFESSIONALS Ages 18 to 30 The survey was translated into local languages and conducted in August 2012 across 18 countries to gain at least 100 completes for each subgroup in each country 18 Countries: United States, Canada, Mexico, Brazil, Argentina, United Kingdom, France, Germany, Netherlands, Russia, Poland, Turkey, South Africa, Korea, India, China, Japan, Australia © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
  • 15. On average, Gen Y uses 2 to 3 Internet devices, such as laptops, tablets, PCs, smartphones Nearly 3 out of 5 say Internet browsing should be strictly private at work and at home… TEXT …Yet nearly 91% believe the age of online privacy is over. 1 in 10 Gen Y have so many passwords they lose count and forget them regularly. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
  • 16. Globally 91% of global millennials feel that the age of privacy is over. However, one third of the respondents are not worried about all the data that is stored and captured about them. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
  • 17. Employers vs. Employees Is it okay for employers to track employee Internet No activities if they are using a company device? 66% Yes 34% © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
  • 18. Employers vs. Employees 1 in 5 say “my employer tracks internet use on company-owned PC’s, laptops, smartphones” ? Over 1 in 4 don’t know if their Internet usage is being tracked © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. 2 in 5 Gen Y Internet browsing should be strictly private Over 1/3 It’s okay only if I give permission first © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 20. 57% 90% will share email address to get discounts and sale notices shop online 3 out of 5 rely on customer reviews for online shopping But 75% do not trust most internet sites to keep data secure © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  • 21. GEN Y AVERAGE: 2 to 3 devices Almost half use 2 devices 1 device 2 devices 3 devices 4 devices 5 or more 17% 46% 29% 6% 2% © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
  • 22. Over 25% 1 in 10 use 5 to 9 passwords have so many passwords they have lost count! CaTxx123! catxx3210 dogxx321 ! Catxx321 Catxx321 X325*1 1358acds ? CaTxx123! CaTxx123! dogxx321 1358acds 1358acds catxx3210 X325*1 orange321 X325*1 ABC123! X325*1 ABC123! 1358acds 1358acds catXX12! catXX12! 1358acds Catxx321 catxx3210 barker357! barker357! Catxx321 barker357! CaTxx123! catXX12! Catxx321 dogxx321 dogxx321 dogxx321 dogxx321 CaTxx123! barker357! dogxx321 barker357! ABC123! barker357! ABC123! © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  • 23. Online Identity over 1/3 believe 4 5 out of (81%) “most people have completely different online vs. offline identities” Believe people have different online and less than offline identities 50% say “my online and offline identities are the same” © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
  • 24. Disconnect with corporate IT 40% say that company policy forbids using company-owned devices for personal activities. 71% don’t obey policies, almost 3 out of 4 50% of IT professionals believe: “our employees obey the policies on personal use” © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24

Editor's Notes

  1. Most Generation Y employees believe the age of privacy is over (91%), but one third say that they are not worried about all the data that is stored and captured about them. Tradeoffs are being made as people get more convenience and experience out of the online world – either through simple communications like email and texting to more complex and open communications like social media and online consumerism – at the expense of sharing more information about their lives and lifestyles, and they do not like it. Aside from a couple countries, 16 of 18 featured more than half of their respondent pools saying they are uncomfortable with this loss of privacy and exposure of personal information (and yet they still engage in online activity like social media, online shopping, etc.) MEX (76%) and KOR (75%) exhibited the highest rate of concern about relinquishing privacy and identity online, an interesting finding being that both countries were some of the more prominent ones in social media and online activity. Only one in three (33%) millennials are fine with this trend and tradeoff, with TUR (57%) being the only nation that featured a majority of respondents being comfortable with this tradeoff in privacy and online experience. Does the world really understand what it is getting into with regard to online activity? Interestingly, NED, which has been the relatively conservative country in the study, revealed one in five millennial respondents (20%) believing that the age of privacy was not waning.