SlideShare a Scribd company logo
LOTUS FOOD MARKET
FREEInternetWorms
Dave’s
Hammer & Nail
HARDWARE
Hammer & Nail
HARDWARE
Ham
m
er
&
Nail
HARDW
ARE
Ham
m
er
&
Nail
HARDW
ARE
WestminsterOrthopedic
Legal Offices
Jordan, Smith and Locke
bjorne
HardHatConstructionCo.
Cyber Crime Comes To Main Street
Are cyber criminals hiding in your small business or government agency?
www.watchguard.com/mainstreet
Nearly half of small businesses have been victims of cyber attacks1
, and 60% of those hit close their doors within 6 months.2
Scroll over the hotspots in town to see how cyber crime hits the little guys (only works with Adobe Acrobat).
Cyber crime doesn’t have to be big to be destructive. Let WatchGuard
protect your small-town business with big-time security.1
2013 survey by the National Small Business Association, http://www.nsba.biz/wp-content/
uploads/2013/09/Technology-Survey-2013.pdf. 2
National Cyber Security Alliance, Stay Safe
Online, Small Business Online Security Infographic, 2014, https://www.staysafeonline.org/
stay-safe-online/resources/small-business-online-security-infographic

More Related Content

What's hot

BCI - Rise of the Machines
 BCI - Rise of the Machines BCI - Rise of the Machines
BCI - Rise of the Machines
Miles Glover
 
Trust Online is at the Breaking Point
Trust Online is at the Breaking PointTrust Online is at the Breaking Point
Trust Online is at the Breaking Point
Venafi
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus
Quick Heal Technologies Ltd.
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016
CTM360
 
mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2
Monica Hamilton
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or not
ebuc
 
Zeitgeist Weekly Report 7-13 Oct 2013
Zeitgeist Weekly Report 7-13 Oct 2013Zeitgeist Weekly Report 7-13 Oct 2013
Zeitgeist Weekly Report 7-13 Oct 2013
11890
 
SonMax Launches its portfolio of Cyber Security, Risk Advisory and Big Data S...
SonMax Launches its portfolio of Cyber Security, Risk Advisory and Big Data S...SonMax Launches its portfolio of Cyber Security, Risk Advisory and Big Data S...
SonMax Launches its portfolio of Cyber Security, Risk Advisory and Big Data S...
Steven Wertheim
 
9 LinkedIn Marketing Hacks to Use RIGHT NOW
9 LinkedIn Marketing Hacks to Use RIGHT NOW9 LinkedIn Marketing Hacks to Use RIGHT NOW
9 LinkedIn Marketing Hacks to Use RIGHT NOW
Ryan Stewart
 
Beyond digital, Tim Difford, May 2015
Beyond digital, Tim Difford, May 2015Beyond digital, Tim Difford, May 2015
Beyond digital, Tim Difford, May 2015
Stephanie Foster
 
Cyber Security - Whats the Worst that Could Happen
Cyber Security - Whats the Worst that Could HappenCyber Security - Whats the Worst that Could Happen
Cyber Security - Whats the Worst that Could Happen
Rob Stevenson
 
Possible cyber security threats of 2016
Possible cyber security threats of 2016Possible cyber security threats of 2016
Possible cyber security threats of 2016
James_08
 
DevSecOps Security Enabling Business and Innovation
DevSecOps Security Enabling Business and InnovationDevSecOps Security Enabling Business and Innovation
DevSecOps Security Enabling Business and Innovation
Monica Verma
 
Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?
Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared? Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?
Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?
LIFARS
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With Scissors
EnergySec
 
A Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber MomentsA Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber Moments
Tripwire
 
Criminal Education: Lessons from the Criminals and Their Methods
Criminal Education: Lessons from the Criminals and Their MethodsCriminal Education: Lessons from the Criminals and Their Methods
Criminal Education: Lessons from the Criminals and Their Methods
HP Enterprise Italia
 

What's hot (17)

BCI - Rise of the Machines
 BCI - Rise of the Machines BCI - Rise of the Machines
BCI - Rise of the Machines
 
Trust Online is at the Breaking Point
Trust Online is at the Breaking PointTrust Online is at the Breaking Point
Trust Online is at the Breaking Point
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016
 
mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or not
 
Zeitgeist Weekly Report 7-13 Oct 2013
Zeitgeist Weekly Report 7-13 Oct 2013Zeitgeist Weekly Report 7-13 Oct 2013
Zeitgeist Weekly Report 7-13 Oct 2013
 
SonMax Launches its portfolio of Cyber Security, Risk Advisory and Big Data S...
SonMax Launches its portfolio of Cyber Security, Risk Advisory and Big Data S...SonMax Launches its portfolio of Cyber Security, Risk Advisory and Big Data S...
SonMax Launches its portfolio of Cyber Security, Risk Advisory and Big Data S...
 
9 LinkedIn Marketing Hacks to Use RIGHT NOW
9 LinkedIn Marketing Hacks to Use RIGHT NOW9 LinkedIn Marketing Hacks to Use RIGHT NOW
9 LinkedIn Marketing Hacks to Use RIGHT NOW
 
Beyond digital, Tim Difford, May 2015
Beyond digital, Tim Difford, May 2015Beyond digital, Tim Difford, May 2015
Beyond digital, Tim Difford, May 2015
 
Cyber Security - Whats the Worst that Could Happen
Cyber Security - Whats the Worst that Could HappenCyber Security - Whats the Worst that Could Happen
Cyber Security - Whats the Worst that Could Happen
 
Possible cyber security threats of 2016
Possible cyber security threats of 2016Possible cyber security threats of 2016
Possible cyber security threats of 2016
 
DevSecOps Security Enabling Business and Innovation
DevSecOps Security Enabling Business and InnovationDevSecOps Security Enabling Business and Innovation
DevSecOps Security Enabling Business and Innovation
 
Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?
Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared? Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?
Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With Scissors
 
A Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber MomentsA Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber Moments
 
Criminal Education: Lessons from the Criminals and Their Methods
Criminal Education: Lessons from the Criminals and Their MethodsCriminal Education: Lessons from the Criminals and Their Methods
Criminal Education: Lessons from the Criminals and Their Methods
 

Viewers also liked

Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
 
Whats new fireware-v11-10.compressed
Whats new fireware-v11-10.compressedWhats new fireware-v11-10.compressed
Whats new fireware-v11-10.compressed
groberts52
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introduction
Jimmy Saigon
 
Watchguard Firewall overview and implemetation
Watchguard  Firewall overview and implemetationWatchguard  Firewall overview and implemetation
Watchguard Firewall overview and implemetation
Kaveh Khosravi
 
Cloudera Federal Forum 2014: Hadoop-Powered Solutions for Cybersecurity
Cloudera Federal Forum 2014: Hadoop-Powered Solutions for CybersecurityCloudera Federal Forum 2014: Hadoop-Powered Solutions for Cybersecurity
Cloudera Federal Forum 2014: Hadoop-Powered Solutions for Cybersecurity
Cloudera, Inc.
 
IoT and Big Data
IoT and Big DataIoT and Big Data
IoT and Big Data
sabnees
 
האינטרנט של הדברים
האינטרנט של הדבריםהאינטרנט של הדברים
האינטרנט של הדברים
Carmelon Digital Marketing
 
Windows 10 iot core dot net notts - 27-07-15
Windows 10 iot core   dot net notts - 27-07-15Windows 10 iot core   dot net notts - 27-07-15
Windows 10 iot core dot net notts - 27-07-15
Peter Gallagher
 
IoT and BigData
IoT and BigDataIoT and BigData
IoT and BigData
Daan Gerits
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoop
Niel Dunnage
 
Introduction To The IBM IoT Foundation
Introduction To The IBM IoT FoundationIntroduction To The IBM IoT Foundation
Introduction To The IBM IoT Foundation
petecrocker
 
The 5 key V's of Big Data
The 5 key V's of Big DataThe 5 key V's of Big Data
The 5 key V's of Big Data
Anric Blatt
 
Big data in the real world opportunities and challenges facing healthcare -...
Big data in the real world   opportunities and challenges facing healthcare -...Big data in the real world   opportunities and challenges facing healthcare -...
Big data in the real world opportunities and challenges facing healthcare -...
Leo Barella
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)
Bernard Kufluk
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
Stephen Cobb
 
Big data solutions explained for marketeers & business executives
Big data solutions explained for marketeers & business executivesBig data solutions explained for marketeers & business executives
Big data solutions explained for marketeers & business executives
Agile Delivery
 
Display device (mqtt) data with Real Time Insights on IBM Internet of Things ...
Display device (mqtt) data with Real Time Insights on IBM Internet of Things ...Display device (mqtt) data with Real Time Insights on IBM Internet of Things ...
Display device (mqtt) data with Real Time Insights on IBM Internet of Things ...
Markus Van Kempen
 
Big data ppt
Big data pptBig data ppt
Big data ppt
Thirunavukkarasu Ps
 
Big Data - The 5 Vs Everyone Must Know
Big Data - The 5 Vs Everyone Must KnowBig Data - The 5 Vs Everyone Must Know
Big Data - The 5 Vs Everyone Must Know
Bernard Marr
 
Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015
Scalar Decisions
 

Viewers also liked (20)

Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Whats new fireware-v11-10.compressed
Whats new fireware-v11-10.compressedWhats new fireware-v11-10.compressed
Whats new fireware-v11-10.compressed
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introduction
 
Watchguard Firewall overview and implemetation
Watchguard  Firewall overview and implemetationWatchguard  Firewall overview and implemetation
Watchguard Firewall overview and implemetation
 
Cloudera Federal Forum 2014: Hadoop-Powered Solutions for Cybersecurity
Cloudera Federal Forum 2014: Hadoop-Powered Solutions for CybersecurityCloudera Federal Forum 2014: Hadoop-Powered Solutions for Cybersecurity
Cloudera Federal Forum 2014: Hadoop-Powered Solutions for Cybersecurity
 
IoT and Big Data
IoT and Big DataIoT and Big Data
IoT and Big Data
 
האינטרנט של הדברים
האינטרנט של הדבריםהאינטרנט של הדברים
האינטרנט של הדברים
 
Windows 10 iot core dot net notts - 27-07-15
Windows 10 iot core   dot net notts - 27-07-15Windows 10 iot core   dot net notts - 27-07-15
Windows 10 iot core dot net notts - 27-07-15
 
IoT and BigData
IoT and BigDataIoT and BigData
IoT and BigData
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoop
 
Introduction To The IBM IoT Foundation
Introduction To The IBM IoT FoundationIntroduction To The IBM IoT Foundation
Introduction To The IBM IoT Foundation
 
The 5 key V's of Big Data
The 5 key V's of Big DataThe 5 key V's of Big Data
The 5 key V's of Big Data
 
Big data in the real world opportunities and challenges facing healthcare -...
Big data in the real world   opportunities and challenges facing healthcare -...Big data in the real world   opportunities and challenges facing healthcare -...
Big data in the real world opportunities and challenges facing healthcare -...
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
Big data solutions explained for marketeers & business executives
Big data solutions explained for marketeers & business executivesBig data solutions explained for marketeers & business executives
Big data solutions explained for marketeers & business executives
 
Display device (mqtt) data with Real Time Insights on IBM Internet of Things ...
Display device (mqtt) data with Real Time Insights on IBM Internet of Things ...Display device (mqtt) data with Real Time Insights on IBM Internet of Things ...
Display device (mqtt) data with Real Time Insights on IBM Internet of Things ...
 
Big data ppt
Big data pptBig data ppt
Big data ppt
 
Big Data - The 5 Vs Everyone Must Know
Big Data - The 5 Vs Everyone Must KnowBig Data - The 5 Vs Everyone Must Know
Big Data - The 5 Vs Everyone Must Know
 
Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015
 

Similar to cybercrime-comes-to-mainstreet

SCIONETIX PRESENTATIONaarevised(1)
SCIONETIX PRESENTATIONaarevised(1)SCIONETIX PRESENTATIONaarevised(1)
SCIONETIX PRESENTATIONaarevised(1)
Tom Anderegg
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
Eddie Hirst MSc MSyl
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
Meg Weber
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
Declan Winston Ramsaran
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
DevOps.com
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
RitamaJana
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
Henry Worth
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website Behavior
EMC
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year?
XNSPY
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
CYBERWISER .eu
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
anpapathanasiou
 
Cybersecurity announcement final
Cybersecurity announcement   finalCybersecurity announcement   final
Cybersecurity announcement final
David Jimenez
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
Alistair Blake
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250
Chris Crowe
 
Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka
zigix
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
John Ryan
 
Is your data safe Infographic by Symantec
Is your data safe Infographic by SymantecIs your data safe Infographic by Symantec
Is your data safe Infographic by Symantec
Cheapest SSLs
 
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationCyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop Presentation
Brad Deflin
 
5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business
IndusfacePvtLtd
 
Cyber liability FINAL
Cyber liability FINALCyber liability FINAL
Cyber liability FINAL
Chris Evans
 

Similar to cybercrime-comes-to-mainstreet (20)

SCIONETIX PRESENTATIONaarevised(1)
SCIONETIX PRESENTATIONaarevised(1)SCIONETIX PRESENTATIONaarevised(1)
SCIONETIX PRESENTATIONaarevised(1)
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website Behavior
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year?
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
 
Cybersecurity announcement final
Cybersecurity announcement   finalCybersecurity announcement   final
Cybersecurity announcement final
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250
 
Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
 
Is your data safe Infographic by Symantec
Is your data safe Infographic by SymantecIs your data safe Infographic by Symantec
Is your data safe Infographic by Symantec
 
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationCyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop Presentation
 
5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business
 
Cyber liability FINAL
Cyber liability FINALCyber liability FINAL
Cyber liability FINAL
 

cybercrime-comes-to-mainstreet

  • 1. LOTUS FOOD MARKET FREEInternetWorms Dave’s Hammer & Nail HARDWARE Hammer & Nail HARDWARE Ham m er & Nail HARDW ARE Ham m er & Nail HARDW ARE WestminsterOrthopedic Legal Offices Jordan, Smith and Locke bjorne HardHatConstructionCo. Cyber Crime Comes To Main Street Are cyber criminals hiding in your small business or government agency? www.watchguard.com/mainstreet Nearly half of small businesses have been victims of cyber attacks1 , and 60% of those hit close their doors within 6 months.2 Scroll over the hotspots in town to see how cyber crime hits the little guys (only works with Adobe Acrobat). Cyber crime doesn’t have to be big to be destructive. Let WatchGuard protect your small-town business with big-time security.1 2013 survey by the National Small Business Association, http://www.nsba.biz/wp-content/ uploads/2013/09/Technology-Survey-2013.pdf. 2 National Cyber Security Alliance, Stay Safe Online, Small Business Online Security Infographic, 2014, https://www.staysafeonline.org/ stay-safe-online/resources/small-business-online-security-infographic