SlideShare a Scribd company logo
1 of 11
Is Phishing A Threat?
The Total Number Of
Phishing Attacks Was
59% Higher In 2012
Than 2011.
Source: RSA Report On Phishing
And It’s Getting Worse
In 2012-2013, 37.3 million
users were subjected to
phishing attacks.
Up 87% from
2011-2012.
Source: Kaspersky Labs: Evolution of Phishing 2011-2013
Phishing is the most prevalent
web-borne attack, affecting
55% of companies.
Source: Kaspersky Labs: Evolution of Phishing 2011-2013
In the past 12 months, 91% of
companies surveyed had at
least one external IT security
incident
Source: Kaspersky Labs Report
Of Security Breaches
Involved Social Tactics
Source: 2013 Verizon Data Breach Investigations Report
Phishing Is The
Most Used
Social Tactic

71%
Source: 2013 Verizon Data Breach Investigations Report
Have you tested your
employees?
Our easy-to-use software allows any company to
conduct social engineering tests via phishing.

Free Trial

More Related Content

Viewers also liked

Casino Cheating Infographic
Casino Cheating InfographicCasino Cheating Infographic
Casino Cheating Infographic
Pokersitescom
 
Mendoza see 4099 ppt.
Mendoza see 4099 ppt.Mendoza see 4099 ppt.
Mendoza see 4099 ppt.
britttaa_
 
SARCO Services
SARCO ServicesSARCO Services
SARCO Services
Sunil Rao
 
Night Embrace- Sherrilyn Kenyon
Night Embrace- Sherrilyn KenyonNight Embrace- Sherrilyn Kenyon
Night Embrace- Sherrilyn Kenyon
Brizi Sue
 

Viewers also liked (20)

Mardi himal trekking
Mardi himal trekkingMardi himal trekking
Mardi himal trekking
 
Casino Cheating Infographic
Casino Cheating InfographicCasino Cheating Infographic
Casino Cheating Infographic
 
Imperative for Innovative entrepreneurship
Imperative for Innovative entrepreneurshipImperative for Innovative entrepreneurship
Imperative for Innovative entrepreneurship
 
Dt lab empathy syang8.2.13
Dt lab empathy syang8.2.13Dt lab empathy syang8.2.13
Dt lab empathy syang8.2.13
 
Double doods building loyalty
Double doods   building loyaltyDouble doods   building loyalty
Double doods building loyalty
 
Application
ApplicationApplication
Application
 
Agriculture policy approach_islambarbaruah
Agriculture policy approach_islambarbaruahAgriculture policy approach_islambarbaruah
Agriculture policy approach_islambarbaruah
 
Langtang valley trek
Langtang valley trek Langtang valley trek
Langtang valley trek
 
Mendoza see 4099 ppt.
Mendoza see 4099 ppt.Mendoza see 4099 ppt.
Mendoza see 4099 ppt.
 
Development intervention livestock sector_islambarbaruah
Development intervention livestock sector_islambarbaruahDevelopment intervention livestock sector_islambarbaruah
Development intervention livestock sector_islambarbaruah
 
Commercial horticulture_Northeast India_islam_barbaruah
Commercial horticulture_Northeast India_islam_barbaruahCommercial horticulture_Northeast India_islam_barbaruah
Commercial horticulture_Northeast India_islam_barbaruah
 
Readme
ReadmeReadme
Readme
 
EI Naptosa March 2014
EI Naptosa March 2014EI Naptosa March 2014
EI Naptosa March 2014
 
Industry associations and_entrepreneurship
Industry associations and_entrepreneurshipIndustry associations and_entrepreneurship
Industry associations and_entrepreneurship
 
Livestock development northeast_india
Livestock development northeast_indiaLivestock development northeast_india
Livestock development northeast_india
 
SARCO Services
SARCO ServicesSARCO Services
SARCO Services
 
Grade R NAPTOSA Leadership_Conference_2014
Grade R  NAPTOSA Leadership_Conference_2014Grade R  NAPTOSA Leadership_Conference_2014
Grade R NAPTOSA Leadership_Conference_2014
 
NOS for Veterinary Para-professionals in India
NOS for Veterinary Para-professionals in IndiaNOS for Veterinary Para-professionals in India
NOS for Veterinary Para-professionals in India
 
Night Embrace- Sherrilyn Kenyon
Night Embrace- Sherrilyn KenyonNight Embrace- Sherrilyn Kenyon
Night Embrace- Sherrilyn Kenyon
 
Ppt totkvk guwahati_barbaruah
Ppt totkvk guwahati_barbaruahPpt totkvk guwahati_barbaruah
Ppt totkvk guwahati_barbaruah
 

Recently uploaded

Recently uploaded (20)

Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 

Is Phishing A Threat?

  • 1. Is Phishing A Threat?
  • 2.
  • 3.
  • 4. The Total Number Of Phishing Attacks Was 59% Higher In 2012 Than 2011. Source: RSA Report On Phishing
  • 6. In 2012-2013, 37.3 million users were subjected to phishing attacks. Up 87% from 2011-2012. Source: Kaspersky Labs: Evolution of Phishing 2011-2013
  • 7. Phishing is the most prevalent web-borne attack, affecting 55% of companies. Source: Kaspersky Labs: Evolution of Phishing 2011-2013
  • 8. In the past 12 months, 91% of companies surveyed had at least one external IT security incident Source: Kaspersky Labs Report
  • 9. Of Security Breaches Involved Social Tactics Source: 2013 Verizon Data Breach Investigations Report
  • 10. Phishing Is The Most Used Social Tactic 71% Source: 2013 Verizon Data Breach Investigations Report
  • 11. Have you tested your employees? Our easy-to-use software allows any company to conduct social engineering tests via phishing. Free Trial