SlideShare a Scribd company logo
1 of 1
Download to read offline
JOY TO THE WORLD
Next-Gen Vulnerability Management
Secures Holiday Shopping
Top Retail Sales Days1

Cyber-criminals don’t
take the Holidays off!

Thefts of payment card data and other Personally Identifiable Information
(PII) will result in big losses for consumers and merchants.2

est.

xxx-xx-xxxx

Holiday Shopping Activity Black Friday Weekend:
During peak holiday shopping season, InfoSec teams at merchants, banks and service providers
are in production-freeze. What matters most is maintaining the flow of commerce.3

2011

2012

2013

247

226

Shoppers in Millions

$61.4 est.

$59.1

$52.4

255 est.

Holiday Shopping in Billions

Cyber-crime delivers a lump of coal —
$388 Billion in worldwide costs
4

70%

47,000+

621

of all cybercrime is financially
motivated

reported security incidents

confirmed data disclosures

44 Million+

52%

66%

reported breaches involved
hacking

compromised records

reported breaches took months
to discover

I’m Dreaming of a Mobile Christmas

Consumers will use smartphones for holiday shopping and m-commerce.5

56%

45%

36%

54%

44%

32%

47%

40%

31%

Mobile Safety Tips
Wi-Fi hotspots:

Protect your $$:

Almost 40% don’t take even minimal
security measures:

Naughty Apps!:

Limit the type of business you conduct and
adjust the security settings on your device
to limit who can access your phone.6

When banking and shopping, check to be
sure the site is security enabled. Look for
web addresses with "https://" or "shttp://,"
which means the site secures your
information. "Http://" is not secure.6

Use a screen lock, back up data, and install
an app to locate a missing phone and
remotely erase data from it.7

When in doubt, don't respond:

Fradulent texting, calling and voicemails are
on the rise. Just like email, requests for
personal information or for immediate
action are almost always a scam.6

Beware of legit-looking, but potentially
malicious shopping apps from dubious
sources. Only download apps signed by
reputable retailers.

Holiday-Induced Vulnerability Bloat

8

Happy New Year! Even if they
reach January 2014 with nary
a hack or breach, infosec
teams must catch up on
time-consuming system
updates and patching projects
while preparing for annual
compliance assessments.8

Remotely Exploitable Vulnerabilities
Nov. — Dec. 2012

Jan. 2013

What is Tenable Next-Generation Vulnerability Management?

Tenable SecurityCenter Continuous View is the industry’s only next-generation
vulnerability management platform. It combines scan data, network intelligence and
activity logs collected from Tenable’s industry leading sensors, Nessus, Passive
Vulnerability Scanner and Log Correlation Engine, to deliver the most advanced
analysis of security risks and compliance exposure present in enterprise IT
environments. Learn more: www.tenable.com/next-gen.

Sources

1: Mastercard’s Projected Top Shopping Days for 2013 (released on 11/20/2013)
2: Capgemini World Payments Report 2013 & http://www.nrf.com/modules.php?name=Pages&sp_id=1140
3: About.com, http://useconomy.about.com/od/demand/f/Black_Friday.htm
4: Verizon, 2013 Verizon Data Breach Investigations Report
5:http://www.internetretailer.com/2013/10/24/mobile-devices-will-play-big-role-2013-holiday-shopping
6:http://staysafeonline.org/stay-safe-online/mobile-and-on-the-go/mobile-devices
7: http://consumerreports.org/privacy0613
8: http://web.nvd.nist.gov/view/vuln/statistics
© 2013 Tenable Network Security, Inc.

More Related Content

What's hot

2014 information technology threat predictions
2014 information technology threat predictions2014 information technology threat predictions
2014 information technology threat predictionsPrayukth K V
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPaloAltoNetworks
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five yearsSABBY GILL
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Microsoft
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019SrikanthRaju7
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them SrikanthRaju7
 
Smartphone and mobile device safety & security
Smartphone and mobile device safety & securitySmartphone and mobile device safety & security
Smartphone and mobile device safety & securityAlbanMichael
 
Business inSecurity
Business inSecurityBusiness inSecurity
Business inSecurityEboney Brown
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Cristian Garcia G.
 
Security and Your Business
Security and Your BusinessSecurity and Your Business
Security and Your BusinessAll Covered
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016Shannon G., MBA
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingCigniti Technologies Ltd
 
The Case of the Mistaken Malware
The Case of the Mistaken MalwareThe Case of the Mistaken Malware
The Case of the Mistaken MalwareSecurityMetrics
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...CODE BLUE
 
Quick heal laptop tracker
Quick heal  laptop trackerQuick heal  laptop tracker
Quick heal laptop trackerQuick Heal
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 

What's hot (20)

2014 information technology threat predictions
2014 information technology threat predictions2014 information technology threat predictions
2014 information technology threat predictions
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity Predictions
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
 
Smartphone and mobile device safety & security
Smartphone and mobile device safety & securitySmartphone and mobile device safety & security
Smartphone and mobile device safety & security
 
Business inSecurity
Business inSecurityBusiness inSecurity
Business inSecurity
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
 
Cyber security trends 2018
Cyber security trends 2018Cyber security trends 2018
Cyber security trends 2018
 
Security and Your Business
Security and Your BusinessSecurity and Your Business
Security and Your Business
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 
The Case of the Mistaken Malware
The Case of the Mistaken MalwareThe Case of the Mistaken Malware
The Case of the Mistaken Malware
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Quick heal laptop tracker
Quick heal  laptop trackerQuick heal  laptop tracker
Quick heal laptop tracker
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 

Viewers also liked

Niveles nueva metra
Niveles nueva metraNiveles nueva metra
Niveles nueva metraarar2110
 
Букин Д.Ю. Мультимедийные ресурсы
Букин Д.Ю. Мультимедийные ресурсыБукин Д.Ю. Мультимедийные ресурсы
Букин Д.Ю. Мультимедийные ресурсыlentik
 
Cómo educar en valores
Cómo educar en valoresCómo educar en valores
Cómo educar en valoresAudino Fuentes
 
Logros en recursos e instalaciones
Logros en recursos e instalacionesLogros en recursos e instalaciones
Logros en recursos e instalacionesfranju
 
công ty hiếu ngọc-tay son,binh dinh
công ty hiếu ngọc-tay son,binh dinhcông ty hiếu ngọc-tay son,binh dinh
công ty hiếu ngọc-tay son,binh dinhNguyen Thi Loan
 
Christmas in italy
Christmas in italyChristmas in italy
Christmas in italygiacolone
 
La tecnologia y sus multiples relaciones
La tecnologia y sus multiples relacionesLa tecnologia y sus multiples relaciones
La tecnologia y sus multiples relacionesMateo Paz Quintero
 
Silk'n Glide Depiladora Luz Pulsada
Silk'n Glide Depiladora Luz Pulsada
Silk'n Glide Depiladora Luz Pulsada
Silk'n Glide Depiladora Luz Pulsada joyce3deleon31
 
CAWASA e-Source Newsletter - Issue 5 : January - June 2013
CAWASA e-Source Newsletter - Issue 5 : January - June 2013 CAWASA e-Source Newsletter - Issue 5 : January - June 2013
CAWASA e-Source Newsletter - Issue 5 : January - June 2013 CAWASA
 
petit-papa-noel
 petit-papa-noel petit-papa-noel
petit-papa-noelBalcon60
 
Tolerancias dimensionales 1
Tolerancias dimensionales 1Tolerancias dimensionales 1
Tolerancias dimensionales 1edwin1520
 
Juego tradicional frente al juego digital (grupo 13)
Juego tradicional frente al juego digital (grupo 13)Juego tradicional frente al juego digital (grupo 13)
Juego tradicional frente al juego digital (grupo 13)Maria Jose López
 
Vendemore Pres Event Conductive "Strategic Product Management"
Vendemore Pres Event Conductive "Strategic Product Management"Vendemore Pres Event Conductive "Strategic Product Management"
Vendemore Pres Event Conductive "Strategic Product Management"Vendemore [A Bisnode Company]
 
три A маркетинговых компаний от Digital Boutique
три A маркетинговых компаний от Digital Boutiqueтри A маркетинговых компаний от Digital Boutique
три A маркетинговых компаний от Digital BoutiqueEkaterina Gould
 

Viewers also liked (20)

Niveles nueva metra
Niveles nueva metraNiveles nueva metra
Niveles nueva metra
 
Ushtrimi 9
Ushtrimi 9Ushtrimi 9
Ushtrimi 9
 
Garabato Diciembre 2015
Garabato Diciembre 2015Garabato Diciembre 2015
Garabato Diciembre 2015
 
Букин Д.Ю. Мультимедийные ресурсы
Букин Д.Ю. Мультимедийные ресурсыБукин Д.Ю. Мультимедийные ресурсы
Букин Д.Ю. Мультимедийные ресурсы
 
Cómo educar en valores
Cómo educar en valoresCómo educar en valores
Cómo educar en valores
 
Logros en recursos e instalaciones
Logros en recursos e instalacionesLogros en recursos e instalaciones
Logros en recursos e instalaciones
 
công ty hiếu ngọc-tay son,binh dinh
công ty hiếu ngọc-tay son,binh dinhcông ty hiếu ngọc-tay son,binh dinh
công ty hiếu ngọc-tay son,binh dinh
 
Christmas in italy
Christmas in italyChristmas in italy
Christmas in italy
 
CERTIFICATE_14
CERTIFICATE_14CERTIFICATE_14
CERTIFICATE_14
 
La tecnologia y sus multiples relaciones
La tecnologia y sus multiples relacionesLa tecnologia y sus multiples relaciones
La tecnologia y sus multiples relaciones
 
Baby Centre Mobile Mum Report
Baby Centre Mobile Mum ReportBaby Centre Mobile Mum Report
Baby Centre Mobile Mum Report
 
Comp.Org. Nitr.
Comp.Org. Nitr.Comp.Org. Nitr.
Comp.Org. Nitr.
 
Silk'n Glide Depiladora Luz Pulsada
Silk'n Glide Depiladora Luz Pulsada
Silk'n Glide Depiladora Luz Pulsada
Silk'n Glide Depiladora Luz Pulsada
 
CAWASA e-Source Newsletter - Issue 5 : January - June 2013
CAWASA e-Source Newsletter - Issue 5 : January - June 2013 CAWASA e-Source Newsletter - Issue 5 : January - June 2013
CAWASA e-Source Newsletter - Issue 5 : January - June 2013
 
petit-papa-noel
 petit-papa-noel petit-papa-noel
petit-papa-noel
 
Tolerancias dimensionales 1
Tolerancias dimensionales 1Tolerancias dimensionales 1
Tolerancias dimensionales 1
 
Juego tradicional frente al juego digital (grupo 13)
Juego tradicional frente al juego digital (grupo 13)Juego tradicional frente al juego digital (grupo 13)
Juego tradicional frente al juego digital (grupo 13)
 
Vendemore Pres Event Conductive "Strategic Product Management"
Vendemore Pres Event Conductive "Strategic Product Management"Vendemore Pres Event Conductive "Strategic Product Management"
Vendemore Pres Event Conductive "Strategic Product Management"
 
PKS Stainless Steel Marking
PKS Stainless Steel MarkingPKS Stainless Steel Marking
PKS Stainless Steel Marking
 
три A маркетинговых компаний от Digital Boutique
три A маркетинговых компаний от Digital Boutiqueтри A маркетинговых компаний от Digital Boutique
три A маркетинговых компаний от Digital Boutique
 

Similar to Secure Holiday Shopping with Next-Gen Vulnerability Management

Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Javier Gonzalez
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? XNSPY
 
Cybercriminals and security attacks
Cybercriminals and security attacksCybercriminals and security attacks
Cybercriminals and security attacksGFI Software
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye, Inc.
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCMicrosoft Asia
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Securitylearntransformation0
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022ManviShukla4
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 

Similar to Secure Holiday Shopping with Next-Gen Vulnerability Management (20)

Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year?
 
Cybercriminals and security attacks
Cybercriminals and security attacksCybercriminals and security attacks
Cybercriminals and security attacks
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat Report
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Data Breach Risk Intelligence
Data Breach Risk IntelligenceData Breach Risk Intelligence
Data Breach Risk Intelligence
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 

Recently uploaded

VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 

Recently uploaded (20)

VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 

Secure Holiday Shopping with Next-Gen Vulnerability Management

  • 1. JOY TO THE WORLD Next-Gen Vulnerability Management Secures Holiday Shopping Top Retail Sales Days1 Cyber-criminals don’t take the Holidays off! Thefts of payment card data and other Personally Identifiable Information (PII) will result in big losses for consumers and merchants.2 est. xxx-xx-xxxx Holiday Shopping Activity Black Friday Weekend: During peak holiday shopping season, InfoSec teams at merchants, banks and service providers are in production-freeze. What matters most is maintaining the flow of commerce.3 2011 2012 2013 247 226 Shoppers in Millions $61.4 est. $59.1 $52.4 255 est. Holiday Shopping in Billions Cyber-crime delivers a lump of coal — $388 Billion in worldwide costs 4 70% 47,000+ 621 of all cybercrime is financially motivated reported security incidents confirmed data disclosures 44 Million+ 52% 66% reported breaches involved hacking compromised records reported breaches took months to discover I’m Dreaming of a Mobile Christmas Consumers will use smartphones for holiday shopping and m-commerce.5 56% 45% 36% 54% 44% 32% 47% 40% 31% Mobile Safety Tips Wi-Fi hotspots: Protect your $$: Almost 40% don’t take even minimal security measures: Naughty Apps!: Limit the type of business you conduct and adjust the security settings on your device to limit who can access your phone.6 When banking and shopping, check to be sure the site is security enabled. Look for web addresses with "https://" or "shttp://," which means the site secures your information. "Http://" is not secure.6 Use a screen lock, back up data, and install an app to locate a missing phone and remotely erase data from it.7 When in doubt, don't respond: Fradulent texting, calling and voicemails are on the rise. Just like email, requests for personal information or for immediate action are almost always a scam.6 Beware of legit-looking, but potentially malicious shopping apps from dubious sources. Only download apps signed by reputable retailers. Holiday-Induced Vulnerability Bloat 8 Happy New Year! Even if they reach January 2014 with nary a hack or breach, infosec teams must catch up on time-consuming system updates and patching projects while preparing for annual compliance assessments.8 Remotely Exploitable Vulnerabilities Nov. — Dec. 2012 Jan. 2013 What is Tenable Next-Generation Vulnerability Management? Tenable SecurityCenter Continuous View is the industry’s only next-generation vulnerability management platform. It combines scan data, network intelligence and activity logs collected from Tenable’s industry leading sensors, Nessus, Passive Vulnerability Scanner and Log Correlation Engine, to deliver the most advanced analysis of security risks and compliance exposure present in enterprise IT environments. Learn more: www.tenable.com/next-gen. Sources 1: Mastercard’s Projected Top Shopping Days for 2013 (released on 11/20/2013) 2: Capgemini World Payments Report 2013 & http://www.nrf.com/modules.php?name=Pages&sp_id=1140 3: About.com, http://useconomy.about.com/od/demand/f/Black_Friday.htm 4: Verizon, 2013 Verizon Data Breach Investigations Report 5:http://www.internetretailer.com/2013/10/24/mobile-devices-will-play-big-role-2013-holiday-shopping 6:http://staysafeonline.org/stay-safe-online/mobile-and-on-the-go/mobile-devices 7: http://consumerreports.org/privacy0613 8: http://web.nvd.nist.gov/view/vuln/statistics © 2013 Tenable Network Security, Inc.