average annual cost 
of cybercrime facing 
businesses 
Overcoming 
Cyber Attacks 
Are businesses today doing enough to succeed in the 
battle against cyber security threats and are the traditional 
methods they are using the most effective? 
Cyber challenges facing today’s businesses 
Are you protected? 
Major real life data breaches in 2013/14 
Number of records stolen 
Yet 52% 
There was a 62% 
Effectiveness of traditional security solutions 
Password protection Antivirus software 
90% 
1 0 1 0 1 0 0 1 
0 1 E A S Y 1 0 0 UPDATE 
0 1 1 0 0 0 0 1 
1 0 1 0 1 1 0 0 
0 1 1 0 0 0 0 1 
1 0 1 0 1 1 0 0 
0 1 1 0 0 0 0 1 
1 0 1 0 1 1 0 0 
0 1 1 0 0 0 0 1 
1 0 1 0 1 1 0 0 
...while48% 
$7,000,000 
...yet81% 
1 0 1 0 1 1 0 0 
0 1 1 0 0 0 0 1 
Proactive defense in depth 
The Cyber Security Council's 5 most effective solutions for dealing with cyber threat: 
Patch system and 
application software 
within 48 hours 
Reduce number 
of users with 
administrative 
privileges 
Patch system 
software within 
within 48 hours 
Use of standard, 
secure system 
configurations 
Application 
whitelisting 
App control is the #1 strategy for 
overcoming real world attacks 
(Australian DoD) 
of passwords are 
vulnerable to hacking 
Top 5 
common passwords of 2013 
92% of organizations 
say up to date antivirus 
software is in use today... 
... yet only 34% 
rate it as highly effective in 
preventing cyber intrusions 
Firewalls 
88% say a perimeter 
firewall is in use today... 
...the remaining 12% 
have plans to implement one 
34% of an 
organization’s total time on IT 
security issues is dedicated 
to managing user profiles ... 
92% of critical 
Microsoft vulnerabilities 
would be mitigated by 
removing admin rights 
100% of Internet 
Explorer vulnerabilities 
would be mitigated by 
removing admin rights. 
@ 
Phishing 
53% 
Rogue software 
/downloads 
60% 
Target 
Unpatched 
vulnerabilities 
74% 
Targeted 
attacks (APTs) 
77% 
$7m= 
of companies are either 
not prepared or only 
minimally prepared to 
deal with attacks 
is dedicated to securing 
the endpoint... 
say that securing the 
endpoint is difficult 
to achieve 
increase in the number 
of data breaches in 2013 
Over 288,000 new 
cyber threats are 
reported every day 
– that’s 3 per 
second 
US Military Veterans LivingSocial Adobe 
110 
Million 
70 
Million 
50 
Million 
38 
Million 
Man in the 
middle attacks 
38% 
++- - = 
1 . 1 2 3 4 5 6 
2 . password 
3 . 1 2 3 4 5 6 7 8 
4 . q w e r t y 
5 . a b c 1 2 3 
6th of never 
1 0 1 0 1 0 0 1 
0 1 1 0 0 0 0 1 
1 0 1 0 1 0 0 1 
0 1 1 0 0 0 0 1 
1 0 1 0 1 0 0 1 
0 1 1 0 0 0 0 1 
1 0 1 0 1 0 0 1 
0 1 1 0 0 0 0 1 
1 0 1 0 1 0 0 1 
0 1 1 0 0 0 0 1 
1 0 1 0 1 0 0 1 
0 1 1 0 0 0 0 1 
A 
Avecto 
@avecto 
Avecto 
avecto.com 
info@avecto.com 
Sources 
Infosec Security Survey: conducted by Avecto at InfoSec 2014. 
The Internet Society: http://www.internetsociety.org/history?gclid=CLyb45al-b0CFcHn 
wgodhIMAxwhttp: //www.personal.psu.edu/users/j/m/jms6423/Engproj/History%20of%20Computer%20Crime.xhtml 
Computer Hope: http://www.computerhope.com/history/internet.htm 
Heartbleed.com: http://heartbleed.com/ 
Microsoft: http://research.microsoft.com/en-us/um/people/mbj/Smiley/smiley.html 
About.com: http://email.about.com/od/emailtrivia/f/first_spam.htm 
Internet World Stats: http://www.internetworldstats.com/emarketing.htm 
LiveScience: http://www.livescience.com/20727-internet-history.html 
Wikipedia: http://en.wikipedia.org/wiki/Timeline_of_computer_viruses_and_worms 
http://www.nytimes.com/2014/02/09/us/snowden-used-low-cost-tool-to-best-nsa.html?hp&_r=2 
Pew Research Internet Project: http://www.pewinternet.org/2014/03/11/world-wide-web-timeline/ 
UK 
Hobart House 
Cheadle Royal Business Park 
Cheadle, Cheshire, SK8 3SR 
Phone +44 (0)845 519 0114 
Fax +44 (0)845 519 0115 
Americas 
125 Cambridge Park Drive 
Suite 301, Cambridge, 
MA 02140, USA 
Phone 978 703 4169 
Fax 978 910 0448 
Australia 
Level 8 
350 Collins Street, Melbourne, 
Victoria 3000, Australia 
Phone +613 8605 4822 
Fax +613 8601 1180 
Security 
Infographic

Overcoming Cyber Attacks

  • 1.
    average annual cost of cybercrime facing businesses Overcoming Cyber Attacks Are businesses today doing enough to succeed in the battle against cyber security threats and are the traditional methods they are using the most effective? Cyber challenges facing today’s businesses Are you protected? Major real life data breaches in 2013/14 Number of records stolen Yet 52% There was a 62% Effectiveness of traditional security solutions Password protection Antivirus software 90% 1 0 1 0 1 0 0 1 0 1 E A S Y 1 0 0 UPDATE 0 1 1 0 0 0 0 1 1 0 1 0 1 1 0 0 0 1 1 0 0 0 0 1 1 0 1 0 1 1 0 0 0 1 1 0 0 0 0 1 1 0 1 0 1 1 0 0 0 1 1 0 0 0 0 1 1 0 1 0 1 1 0 0 ...while48% $7,000,000 ...yet81% 1 0 1 0 1 1 0 0 0 1 1 0 0 0 0 1 Proactive defense in depth The Cyber Security Council's 5 most effective solutions for dealing with cyber threat: Patch system and application software within 48 hours Reduce number of users with administrative privileges Patch system software within within 48 hours Use of standard, secure system configurations Application whitelisting App control is the #1 strategy for overcoming real world attacks (Australian DoD) of passwords are vulnerable to hacking Top 5 common passwords of 2013 92% of organizations say up to date antivirus software is in use today... ... yet only 34% rate it as highly effective in preventing cyber intrusions Firewalls 88% say a perimeter firewall is in use today... ...the remaining 12% have plans to implement one 34% of an organization’s total time on IT security issues is dedicated to managing user profiles ... 92% of critical Microsoft vulnerabilities would be mitigated by removing admin rights 100% of Internet Explorer vulnerabilities would be mitigated by removing admin rights. @ Phishing 53% Rogue software /downloads 60% Target Unpatched vulnerabilities 74% Targeted attacks (APTs) 77% $7m= of companies are either not prepared or only minimally prepared to deal with attacks is dedicated to securing the endpoint... say that securing the endpoint is difficult to achieve increase in the number of data breaches in 2013 Over 288,000 new cyber threats are reported every day – that’s 3 per second US Military Veterans LivingSocial Adobe 110 Million 70 Million 50 Million 38 Million Man in the middle attacks 38% ++- - = 1 . 1 2 3 4 5 6 2 . password 3 . 1 2 3 4 5 6 7 8 4 . q w e r t y 5 . a b c 1 2 3 6th of never 1 0 1 0 1 0 0 1 0 1 1 0 0 0 0 1 1 0 1 0 1 0 0 1 0 1 1 0 0 0 0 1 1 0 1 0 1 0 0 1 0 1 1 0 0 0 0 1 1 0 1 0 1 0 0 1 0 1 1 0 0 0 0 1 1 0 1 0 1 0 0 1 0 1 1 0 0 0 0 1 1 0 1 0 1 0 0 1 0 1 1 0 0 0 0 1 A Avecto @avecto Avecto avecto.com info@avecto.com Sources Infosec Security Survey: conducted by Avecto at InfoSec 2014. The Internet Society: http://www.internetsociety.org/history?gclid=CLyb45al-b0CFcHn wgodhIMAxwhttp: //www.personal.psu.edu/users/j/m/jms6423/Engproj/History%20of%20Computer%20Crime.xhtml Computer Hope: http://www.computerhope.com/history/internet.htm Heartbleed.com: http://heartbleed.com/ Microsoft: http://research.microsoft.com/en-us/um/people/mbj/Smiley/smiley.html About.com: http://email.about.com/od/emailtrivia/f/first_spam.htm Internet World Stats: http://www.internetworldstats.com/emarketing.htm LiveScience: http://www.livescience.com/20727-internet-history.html Wikipedia: http://en.wikipedia.org/wiki/Timeline_of_computer_viruses_and_worms http://www.nytimes.com/2014/02/09/us/snowden-used-low-cost-tool-to-best-nsa.html?hp&_r=2 Pew Research Internet Project: http://www.pewinternet.org/2014/03/11/world-wide-web-timeline/ UK Hobart House Cheadle Royal Business Park Cheadle, Cheshire, SK8 3SR Phone +44 (0)845 519 0114 Fax +44 (0)845 519 0115 Americas 125 Cambridge Park Drive Suite 301, Cambridge, MA 02140, USA Phone 978 703 4169 Fax 978 910 0448 Australia Level 8 350 Collins Street, Melbourne, Victoria 3000, Australia Phone +613 8605 4822 Fax +613 8601 1180 Security Infographic