SlideShare a Scribd company logo
1 of 1
Download to read offline
WHY IS SECURITY SO LAX?
By the end of 2015, more than 75
percent of U.S. employees (and more
than 1.3 billion workers worldwide)
will routinely work remotely. The
growth of this mobile workforce
means that more sensitive business
data (customer information,
financial records, trade secrets) will
be at increased risk from hackers,
scammers, and cyberthieves.
You feel lucky you can rely on your
employees to ensure that your
valuable business data and devices
are secure and protected.
Or can you?
Malware on mobile devices is on the rise—even a phone with security measures in
place is not immune if a malicious application is unintentionally downloaded from a
trusted web store. In fact, a modern smartphone provides an excellent platform for
advanced persistent threats (APTs) and cyberespionage.
The alarming rate of
security noncompliance
by employees today
SHAKY SECURITY
WHY IS SECURITY SO LAX?
of people participate
in bring-your-own-device
(BYOD) programs, using
their personal devices for
work-related activities.
30% 49%
Almost half
HIGH COST OF CYBERCRIMEHIGH COST OF CYBERCRIME
WHO IS MOST AT RISK?WHO IS MOST AT RISK?
BETTER SOLUTION FOR
MORE SECURE FUTURE
BETTER SOLUTION FOR
MORE SECURE FUTURE
SYMANTEC STRONG
AUTHENTICATION
SOLUTIONS
SYMANTEC STRONG
AUTHENTICATION
SOLUTIONS
SHAKY SECURITY
Average total
organizational cost
of data breach (US$)
Average lost
business costs (US$)
Average number of
breached records
VICTIMS OF CYBERCRIME ARE MORE LIKELY TO BE
WHAT WERE THE TWO MOST COMMON PASSWORDS IN 2013?
IS YOUR
DATA SAFE?
1 2 3 4 5 6 s sp a w o r d
of parents let kids
play, download, and
shop on their mobile
work device.
75%
of breaches in 2012
were financially
motivated cyberattacks.
of people surveyed would rather
clean a toilet than come up with
a new password.
of those who own a mobile device don’t protect it
with a password or other basic security measures.
COMPLEXITY
PASSWORD
FATIGUE
Companies make security measures too difficult
for employees to comply with. For example, by 2016,
overly restrictive mobile device management measures
will cause 20% of enterprise BYOD programs to fail,
according to research firm Gartner.
The average user has 26
password-protected accounts
(but only five different passwords).
38%
RESISTANCE
!
WHILE
TO MORE THAN
BREACHES INCREASED
58%
342
MILLION
$
IN 2013,
THE NUMBER OF
IDENTITIES EXPOSED
INCREASED
3.5 TIMES
HOW MUCH IS YOUR
IDENTITY WORTH?
AUSTRALIA
34,249
UNITED STATES
28,765
INDIA
26,586
UNITED KINGDOM
23,833
GERMANY
24,280
UNITED STATES
$5.4 million+
GERMANY
$4.8 million+
AUSTRALIA
$4.1 million+
UNITED KINGDOM
$3.14 million+
FRANCE
$3.76 million+
UNITED STATES
$3.03 million+
AUSTRALIA
$1.95 million+
GERMANY
$1.74 million+
UNITED KINGDOM
$1.41 million+
FRANCE
$1.56 million+
Male 64%
Millennial
Professional
services
66%
Mobile device user 63%
Social network user 68%
Public/unsecured Wi-Fi user 68%
Parent of child age 8–17 65%
20.1%
Nontraditional
services
18.5%
Manufacturing
11.1%
Public
administration
14.8%
Finance,
insurance,
and real estate
13.4%
TOP INDUSTRIES
ATTACKED IN 2013
THE NO. 1 CAUSE OF BREACHES AND COMPROMISED
RECORDS IN LARGE ORGANIZATIONS?
STOLEN
CREDENTIALS
Strong authentication methods such as two-factor authentication (2FA)
or multifactor authentication (MFA) combine two or more factors for
increased security. This is often a combination of the following:
With data breaches and malware on
the rise, the stakes are higher than ever.
Enterprises today require the following:
We often write passwords down.
We use predictable patterns that
thieves anticipate.
We tend to use the same
password for multiple accounts.
We are often careless and fall
victim to thieves who are
“shoulder surfing.”
Cracking, hacking, malware, and
man-in-the-middle, brute force,
dictionary, and behavior-based
attacks are all on the rise today.
A dedicated password-cracking
machine can crack an
eight-character password in
about five hours.
One in five small businesses is a
victim of cybercrime each year.
Almost two-thirds of victims go out of
business within six months of attack.
61%
of all targeted
attacks in 2013
were aimed at
businesses with
fewer than 2,500
employees.
30%
of attacks were
directed at
businesses with
fewer than 250
employees.
PASSWORDS ARE NOT A SMART
SECURITY MEASURE BECAUSE
SMALL BUSINESSES
INCREASINGLY AT RISK
Symantec solutions have the features and
capabilities to provide your enterprise with
strong, scalable, and manageable
authentication for protecting online identities
and interactions between consumers, business
partners, and employees.
SOURCES
“Intelligence Report,” Symantec, December 2013.
“2013 Norton Report,” Symantec, October 2013.
“Reaping the Benefits of Strong, Smarter User Authentication,” Symantec, October 2013.
“Authentication Solutions Buyer’s Guide,” Symantec, May 2013.
“Internet Security Threat Report,” Symantec, April 2013.
“Two-Factor Authentication: A TCO Viewpoint,” Symantec, August 2012.
“2013 Cost of Data Breach Study: Global Analysis,” Symantec and Ponemon Institute, June 2013.
“The Immediate Future of Passwords,” SC Magazine (November 13, 2013),
www.scmagazine.com/the-immediate-future-of-passwords/article/320823/.
EyeVerify newsletter, January 2014.
“Data Breach Investigations Report,” Verizon, April 2013.
2FA solution that is cost
effective, scalable, and
secure, but still provides a
user-friendly experience
Unified solution that can
provide employees with
secure access to applications
and networks while
preventing access by
malicious outside parties
Solution that is easy to roll
out across a large
organization
To learn more, call your Symantec account
representative or visit www.symantec.com.
(e.g., a user name
and a password)
SOMETHING
THE EMPLOYEE
KNOWS
(e.g., a token,
a smart card, etc.)
SOMETHING
THE EMPLOYEE
HAS
(e.g., a fingerprint or
even a behavioral pattern)
SOMETHING
THE EMPLOYEE
IS
+
1
2
3
+
80%
of data breaches could
have been eliminated
with the use of 2FA.
{
SMALL
BUSINESS
CYBERCRIME
Just as nuclear was the
strategic warfare of the
industrial era, cyberwarfare
has become the strategic war
of the information era.
U.S. Secretary of Defense
Leon Panetta
“
”
and“ “” ”
Part number: 21330416

More Related Content

What's hot

What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
Possible cyber security threats of 2016
Possible cyber security threats of 2016Possible cyber security threats of 2016
Possible cyber security threats of 2016James_08
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4IBM Security
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application SecurityVeracode
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research TechSci Research
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?Ping Identity
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Ashish Chauhan
 
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumDeutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumZimperium
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh WebinarArrow ECS UK
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSPaul Walsh
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumZimperium
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security indexsukiennong.vn
 
RSA大会2009-2010分析
RSA大会2009-2010分析RSA大会2009-2010分析
RSA大会2009-2010分析Jordan Pan
 

What's hot (20)

Mobile threat report_q3_2013
Mobile threat report_q3_2013Mobile threat report_q3_2013
Mobile threat report_q3_2013
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Possible cyber security threats of 2016
Possible cyber security threats of 2016Possible cyber security threats of 2016
Possible cyber security threats of 2016
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
Istr19 en
Istr19 enIstr19 en
Istr19 en
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application Security
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
 
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumDeutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMS
 
Vodqa why cybersecurity
Vodqa   why cybersecurityVodqa   why cybersecurity
Vodqa why cybersecurity
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by Zimperium
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
 
RSA大会2009-2010分析
RSA大会2009-2010分析RSA大会2009-2010分析
RSA大会2009-2010分析
 

Similar to Is your data safe Infographic by Symantec

Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionEMC
 
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeNearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeprcircle
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksConstantin Cocioaba
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015anpapathanasiou
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfgalagirishp
 
You Are the Target
You Are the TargetYou Are the Target
You Are the TargetEMC
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekkoDMI
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityRow Murray
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes MobileNetApp
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Spiceworks Ziff Davis
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudSymantec
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014- Mark - Fullbright
 

Similar to Is your data safe Infographic by Symantec (20)

Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeNearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security Risks
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes Mobile
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 

More from Cheapest SSLs

Four ways to secure the internet of things - infographic
Four ways to secure the internet of things - infographicFour ways to secure the internet of things - infographic
Four ways to secure the internet of things - infographicCheapest SSLs
 
Beware Of More Targeted Attacks And Data Breaches - Infographic
Beware Of More Targeted Attacks And Data Breaches - InfographicBeware Of More Targeted Attacks And Data Breaches - Infographic
Beware Of More Targeted Attacks And Data Breaches - InfographicCheapest SSLs
 
Mobile Device Security Infographic
Mobile Device Security InfographicMobile Device Security Infographic
Mobile Device Security InfographicCheapest SSLs
 
2015 Verizon Data Breach Investigations Report
2015 Verizon Data Breach Investigations Report2015 Verizon Data Breach Investigations Report
2015 Verizon Data Breach Investigations ReportCheapest SSLs
 
Internet Security Threat Report 2015
Internet Security Threat Report 2015Internet Security Threat Report 2015
Internet Security Threat Report 2015Cheapest SSLs
 
A Beginner's Guide to Encryption - Infographic
A Beginner's Guide to Encryption - InfographicA Beginner's Guide to Encryption - Infographic
A Beginner's Guide to Encryption - InfographicCheapest SSLs
 
Why private browsing doesn't exist and how to fix it
Why private browsing doesn't exist and how to fix itWhy private browsing doesn't exist and how to fix it
Why private browsing doesn't exist and how to fix itCheapest SSLs
 
Business Critical SSL Certificate Management - Infographic
Business Critical SSL Certificate Management - InfographicBusiness Critical SSL Certificate Management - Infographic
Business Critical SSL Certificate Management - InfographicCheapest SSLs
 
State of mobile app security infographic
State of mobile app security infographicState of mobile app security infographic
State of mobile app security infographicCheapest SSLs
 
BYOD and Physical Security Infographic
BYOD and Physical Security InfographicBYOD and Physical Security Infographic
BYOD and Physical Security InfographicCheapest SSLs
 
12 Tips To Boost Trust & Conversions This Christmas with Thawte
12 Tips To Boost Trust & Conversions This Christmas with Thawte12 Tips To Boost Trust & Conversions This Christmas with Thawte
12 Tips To Boost Trust & Conversions This Christmas with ThawteCheapest SSLs
 
Shellshock "BashBug" - The 25 Year Old Bug Vulnerability
Shellshock "BashBug" - The 25 Year Old Bug VulnerabilityShellshock "BashBug" - The 25 Year Old Bug Vulnerability
Shellshock "BashBug" - The 25 Year Old Bug VulnerabilityCheapest SSLs
 
Symantec Always On SSL Infographic
Symantec Always On SSL InfographicSymantec Always On SSL Infographic
Symantec Always On SSL InfographicCheapest SSLs
 
SSL Certificate Management Infographic - Symantec
SSL Certificate Management Infographic - SymantecSSL Certificate Management Infographic - Symantec
SSL Certificate Management Infographic - SymantecCheapest SSLs
 
Protect data in transit across your business and around the world
Protect data in transit across your business and around the worldProtect data in transit across your business and around the world
Protect data in transit across your business and around the worldCheapest SSLs
 
How attackers hack atm & withdraw cash from an atm using a phone - Infographic
How attackers hack atm & withdraw cash from an atm using a phone - InfographicHow attackers hack atm & withdraw cash from an atm using a phone - Infographic
How attackers hack atm & withdraw cash from an atm using a phone - InfographicCheapest SSLs
 
2013 sets data breach record - Infographic
2013 sets data breach record - Infographic2013 sets data breach record - Infographic
2013 sets data breach record - InfographicCheapest SSLs
 
LinkedIn Password Lifted - Infographic
LinkedIn Password Lifted - InfographicLinkedIn Password Lifted - Infographic
LinkedIn Password Lifted - InfographicCheapest SSLs
 
What really happens when you lose your phone? - Symantec
What really happens when you lose your phone? - SymantecWhat really happens when you lose your phone? - Symantec
What really happens when you lose your phone? - SymantecCheapest SSLs
 
Webmail Security Tips by CheapestSSLs.com
Webmail Security Tips by CheapestSSLs.comWebmail Security Tips by CheapestSSLs.com
Webmail Security Tips by CheapestSSLs.comCheapest SSLs
 

More from Cheapest SSLs (20)

Four ways to secure the internet of things - infographic
Four ways to secure the internet of things - infographicFour ways to secure the internet of things - infographic
Four ways to secure the internet of things - infographic
 
Beware Of More Targeted Attacks And Data Breaches - Infographic
Beware Of More Targeted Attacks And Data Breaches - InfographicBeware Of More Targeted Attacks And Data Breaches - Infographic
Beware Of More Targeted Attacks And Data Breaches - Infographic
 
Mobile Device Security Infographic
Mobile Device Security InfographicMobile Device Security Infographic
Mobile Device Security Infographic
 
2015 Verizon Data Breach Investigations Report
2015 Verizon Data Breach Investigations Report2015 Verizon Data Breach Investigations Report
2015 Verizon Data Breach Investigations Report
 
Internet Security Threat Report 2015
Internet Security Threat Report 2015Internet Security Threat Report 2015
Internet Security Threat Report 2015
 
A Beginner's Guide to Encryption - Infographic
A Beginner's Guide to Encryption - InfographicA Beginner's Guide to Encryption - Infographic
A Beginner's Guide to Encryption - Infographic
 
Why private browsing doesn't exist and how to fix it
Why private browsing doesn't exist and how to fix itWhy private browsing doesn't exist and how to fix it
Why private browsing doesn't exist and how to fix it
 
Business Critical SSL Certificate Management - Infographic
Business Critical SSL Certificate Management - InfographicBusiness Critical SSL Certificate Management - Infographic
Business Critical SSL Certificate Management - Infographic
 
State of mobile app security infographic
State of mobile app security infographicState of mobile app security infographic
State of mobile app security infographic
 
BYOD and Physical Security Infographic
BYOD and Physical Security InfographicBYOD and Physical Security Infographic
BYOD and Physical Security Infographic
 
12 Tips To Boost Trust & Conversions This Christmas with Thawte
12 Tips To Boost Trust & Conversions This Christmas with Thawte12 Tips To Boost Trust & Conversions This Christmas with Thawte
12 Tips To Boost Trust & Conversions This Christmas with Thawte
 
Shellshock "BashBug" - The 25 Year Old Bug Vulnerability
Shellshock "BashBug" - The 25 Year Old Bug VulnerabilityShellshock "BashBug" - The 25 Year Old Bug Vulnerability
Shellshock "BashBug" - The 25 Year Old Bug Vulnerability
 
Symantec Always On SSL Infographic
Symantec Always On SSL InfographicSymantec Always On SSL Infographic
Symantec Always On SSL Infographic
 
SSL Certificate Management Infographic - Symantec
SSL Certificate Management Infographic - SymantecSSL Certificate Management Infographic - Symantec
SSL Certificate Management Infographic - Symantec
 
Protect data in transit across your business and around the world
Protect data in transit across your business and around the worldProtect data in transit across your business and around the world
Protect data in transit across your business and around the world
 
How attackers hack atm & withdraw cash from an atm using a phone - Infographic
How attackers hack atm & withdraw cash from an atm using a phone - InfographicHow attackers hack atm & withdraw cash from an atm using a phone - Infographic
How attackers hack atm & withdraw cash from an atm using a phone - Infographic
 
2013 sets data breach record - Infographic
2013 sets data breach record - Infographic2013 sets data breach record - Infographic
2013 sets data breach record - Infographic
 
LinkedIn Password Lifted - Infographic
LinkedIn Password Lifted - InfographicLinkedIn Password Lifted - Infographic
LinkedIn Password Lifted - Infographic
 
What really happens when you lose your phone? - Symantec
What really happens when you lose your phone? - SymantecWhat really happens when you lose your phone? - Symantec
What really happens when you lose your phone? - Symantec
 
Webmail Security Tips by CheapestSSLs.com
Webmail Security Tips by CheapestSSLs.comWebmail Security Tips by CheapestSSLs.com
Webmail Security Tips by CheapestSSLs.com
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Is your data safe Infographic by Symantec

  • 1. WHY IS SECURITY SO LAX? By the end of 2015, more than 75 percent of U.S. employees (and more than 1.3 billion workers worldwide) will routinely work remotely. The growth of this mobile workforce means that more sensitive business data (customer information, financial records, trade secrets) will be at increased risk from hackers, scammers, and cyberthieves. You feel lucky you can rely on your employees to ensure that your valuable business data and devices are secure and protected. Or can you? Malware on mobile devices is on the rise—even a phone with security measures in place is not immune if a malicious application is unintentionally downloaded from a trusted web store. In fact, a modern smartphone provides an excellent platform for advanced persistent threats (APTs) and cyberespionage. The alarming rate of security noncompliance by employees today SHAKY SECURITY WHY IS SECURITY SO LAX? of people participate in bring-your-own-device (BYOD) programs, using their personal devices for work-related activities. 30% 49% Almost half HIGH COST OF CYBERCRIMEHIGH COST OF CYBERCRIME WHO IS MOST AT RISK?WHO IS MOST AT RISK? BETTER SOLUTION FOR MORE SECURE FUTURE BETTER SOLUTION FOR MORE SECURE FUTURE SYMANTEC STRONG AUTHENTICATION SOLUTIONS SYMANTEC STRONG AUTHENTICATION SOLUTIONS SHAKY SECURITY Average total organizational cost of data breach (US$) Average lost business costs (US$) Average number of breached records VICTIMS OF CYBERCRIME ARE MORE LIKELY TO BE WHAT WERE THE TWO MOST COMMON PASSWORDS IN 2013? IS YOUR DATA SAFE? 1 2 3 4 5 6 s sp a w o r d of parents let kids play, download, and shop on their mobile work device. 75% of breaches in 2012 were financially motivated cyberattacks. of people surveyed would rather clean a toilet than come up with a new password. of those who own a mobile device don’t protect it with a password or other basic security measures. COMPLEXITY PASSWORD FATIGUE Companies make security measures too difficult for employees to comply with. For example, by 2016, overly restrictive mobile device management measures will cause 20% of enterprise BYOD programs to fail, according to research firm Gartner. The average user has 26 password-protected accounts (but only five different passwords). 38% RESISTANCE ! WHILE TO MORE THAN BREACHES INCREASED 58% 342 MILLION $ IN 2013, THE NUMBER OF IDENTITIES EXPOSED INCREASED 3.5 TIMES HOW MUCH IS YOUR IDENTITY WORTH? AUSTRALIA 34,249 UNITED STATES 28,765 INDIA 26,586 UNITED KINGDOM 23,833 GERMANY 24,280 UNITED STATES $5.4 million+ GERMANY $4.8 million+ AUSTRALIA $4.1 million+ UNITED KINGDOM $3.14 million+ FRANCE $3.76 million+ UNITED STATES $3.03 million+ AUSTRALIA $1.95 million+ GERMANY $1.74 million+ UNITED KINGDOM $1.41 million+ FRANCE $1.56 million+ Male 64% Millennial Professional services 66% Mobile device user 63% Social network user 68% Public/unsecured Wi-Fi user 68% Parent of child age 8–17 65% 20.1% Nontraditional services 18.5% Manufacturing 11.1% Public administration 14.8% Finance, insurance, and real estate 13.4% TOP INDUSTRIES ATTACKED IN 2013 THE NO. 1 CAUSE OF BREACHES AND COMPROMISED RECORDS IN LARGE ORGANIZATIONS? STOLEN CREDENTIALS Strong authentication methods such as two-factor authentication (2FA) or multifactor authentication (MFA) combine two or more factors for increased security. This is often a combination of the following: With data breaches and malware on the rise, the stakes are higher than ever. Enterprises today require the following: We often write passwords down. We use predictable patterns that thieves anticipate. We tend to use the same password for multiple accounts. We are often careless and fall victim to thieves who are “shoulder surfing.” Cracking, hacking, malware, and man-in-the-middle, brute force, dictionary, and behavior-based attacks are all on the rise today. A dedicated password-cracking machine can crack an eight-character password in about five hours. One in five small businesses is a victim of cybercrime each year. Almost two-thirds of victims go out of business within six months of attack. 61% of all targeted attacks in 2013 were aimed at businesses with fewer than 2,500 employees. 30% of attacks were directed at businesses with fewer than 250 employees. PASSWORDS ARE NOT A SMART SECURITY MEASURE BECAUSE SMALL BUSINESSES INCREASINGLY AT RISK Symantec solutions have the features and capabilities to provide your enterprise with strong, scalable, and manageable authentication for protecting online identities and interactions between consumers, business partners, and employees. SOURCES “Intelligence Report,” Symantec, December 2013. “2013 Norton Report,” Symantec, October 2013. “Reaping the Benefits of Strong, Smarter User Authentication,” Symantec, October 2013. “Authentication Solutions Buyer’s Guide,” Symantec, May 2013. “Internet Security Threat Report,” Symantec, April 2013. “Two-Factor Authentication: A TCO Viewpoint,” Symantec, August 2012. “2013 Cost of Data Breach Study: Global Analysis,” Symantec and Ponemon Institute, June 2013. “The Immediate Future of Passwords,” SC Magazine (November 13, 2013), www.scmagazine.com/the-immediate-future-of-passwords/article/320823/. EyeVerify newsletter, January 2014. “Data Breach Investigations Report,” Verizon, April 2013. 2FA solution that is cost effective, scalable, and secure, but still provides a user-friendly experience Unified solution that can provide employees with secure access to applications and networks while preventing access by malicious outside parties Solution that is easy to roll out across a large organization To learn more, call your Symantec account representative or visit www.symantec.com. (e.g., a user name and a password) SOMETHING THE EMPLOYEE KNOWS (e.g., a token, a smart card, etc.) SOMETHING THE EMPLOYEE HAS (e.g., a fingerprint or even a behavioral pattern) SOMETHING THE EMPLOYEE IS + 1 2 3 + 80% of data breaches could have been eliminated with the use of 2FA. { SMALL BUSINESS CYBERCRIME Just as nuclear was the strategic warfare of the industrial era, cyberwarfare has become the strategic war of the information era. U.S. Secretary of Defense Leon Panetta “ ” and“ “” ” Part number: 21330416