SlideShare a Scribd company logo
SOLA RW IN D S MSP 2017 C YB ER SEC U R ITY R EPOR T:
C OU LD OVER C ON FID EN C E LEA D TO A N EXTIN C TION EVEN T?
© 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved.
SOLARWINDS MSP 2017 CYBERSECURITY
SURVEY RESULTS
• How do businesses feel about their cybersecurity?
• And what’s the reality?
• We interviewed 400 businesses across the US and
UK, with a healthy mix of SMBs and enterprises.
• Here’s what they said… and what they don’t see…
© 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved.
WHAT THEY SAY ABOUT CYBERSECURITY
87% of organizations
have confidence in
their cybersecurity
© 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved.
SHOULD THEY BE THAT CONFIDENT?
71% reported at least
one breach in the
previous 12 months
(up from 29% the year
prior)
© 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved.
THE CONSEQUENCES COULD HURT
THEIR WALLETS
$76K*
for SMBs
$939Kfor larger enterprises
(Don’t forget the hit to their reputations)
* Based on our own investigation data combined with IBM/Ponemon 2016 study
© 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved.
WHAT SHOULD THEY DO?
Avoid the seven pitfalls
we found during our
research
© 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved.
PITFALL 1: INCONSISTENCY
68% don’t reliably
enforce or audit
security processes
© 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved.
PITFALL 2: NEGLIGENCE
Only 16% considered
user training a priority
© 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved.
PITFALL 3: SHORTSIGHTEDNESS
The majority of respondents
don’t stretch beyond the top
three technological security
techniques
© 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved.
PITFALL 4: COMPLACENCY
Only 29% felt their
reporting was
“robust” (most felt it
was just “adequate”)
© 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved.
PITFALL 5: INFLEXIBILITY
Only 44% rolled out
new tech in response
to a breach
© 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved.
PITFALL 6: STAGNATION
Fewer than 50% adopted
the nine leading
prevention techniques
© 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved.
PITFALL 7: LETHARGY
40% took longer to
detect issues
44% took longer to
respond to issues
46% took longer to
resolve issues
© 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved.
STAY SAFE OUT THERE:
THE BAD GUYS ARE CLOSER THAN YOU THINK
Key takeaways:
• No matter how confident you are, you may be vulnerable
• Attacks and breaches are on the rise
• Look for the seven pitfalls in your own security
Download our full report for the full data:
http://pages.solarwindsmsp.com/lp-cybersecurity-survey-msps.html
© 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved.
HOW WE CAN HELP
SolarWinds MSP helps you deploy a comprehensive, layered approach
to cybersecurity, including:
• Antivirus
• Web protection
• Email protection
• Backup and recovery
• Data breach risk intelligence
To learn more, please visit www.solarwindsmsp.com/

More Related Content

What's hot

EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)Lora O'Haver
 
Common Cybersecurity Mistakes
Common Cybersecurity MistakesCommon Cybersecurity Mistakes
Common Cybersecurity Mistakesmxotech
 
The Future's so Bright or is it?
The Future's so Bright or is it? The Future's so Bright or is it?
The Future's so Bright or is it? LinkedIn Europe
 
6 Small Business Safety Hazards (And How to Avoid Them)
6 Small Business Safety Hazards (And How to Avoid Them)6 Small Business Safety Hazards (And How to Avoid Them)
6 Small Business Safety Hazards (And How to Avoid Them)Grange Insurance
 
6 Small Business Safety Hazards (And How to Avoid Them)
6 Small Business Safety Hazards (And How to Avoid Them)6 Small Business Safety Hazards (And How to Avoid Them)
6 Small Business Safety Hazards (And How to Avoid Them)Grange Insurance
 
Alphaeon Beauty Eyelash Serum
Alphaeon Beauty Eyelash SerumAlphaeon Beauty Eyelash Serum
Alphaeon Beauty Eyelash SerumDavid Applebaum
 
The Fiction behind IT Security Confidence
The Fiction behind IT Security ConfidenceThe Fiction behind IT Security Confidence
The Fiction behind IT Security ConfidenceSolarWinds
 
State of The Industry Presented By Grapeshot, Digiday Programmatic Summit, Ma...
State of The Industry Presented By Grapeshot, Digiday Programmatic Summit, Ma...State of The Industry Presented By Grapeshot, Digiday Programmatic Summit, Ma...
State of The Industry Presented By Grapeshot, Digiday Programmatic Summit, Ma...Digiday
 
postcard example
postcard examplepostcard example
postcard exampleKyle Albert
 
Bug Bounty Tipping Point: Strength in Numbers
Bug Bounty Tipping Point: Strength in NumbersBug Bounty Tipping Point: Strength in Numbers
Bug Bounty Tipping Point: Strength in Numbersbugcrowd
 
AppSecUSA 2016: 'Your License for Bug Hunting Season'
AppSecUSA 2016: 'Your License for Bug Hunting Season'AppSecUSA 2016: 'Your License for Bug Hunting Season'
AppSecUSA 2016: 'Your License for Bug Hunting Season'bugcrowd
 
Fueling Innovation in the Government through Startups
Fueling Innovation in the Government through StartupsFueling Innovation in the Government through Startups
Fueling Innovation in the Government through StartupsAmazon Web Services
 
Top Stressors on Canadian CIOs and Tech Pros
Top Stressors on Canadian CIOs and Tech Pros Top Stressors on Canadian CIOs and Tech Pros
Top Stressors on Canadian CIOs and Tech Pros Jennifer Popovic
 
Telindus cybersecurity survey_report_2019
Telindus cybersecurity survey_report_2019Telindus cybersecurity survey_report_2019
Telindus cybersecurity survey_report_2019ValentinGarcia32
 
Is Wearable Technology part of your Daily Life?
Is Wearable Technology part of your Daily Life?Is Wearable Technology part of your Daily Life?
Is Wearable Technology part of your Daily Life?LinkedIn Europe
 

What's hot (19)

EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)
 
Newsroom
NewsroomNewsroom
Newsroom
 
self stress
self stressself stress
self stress
 
Common Cybersecurity Mistakes
Common Cybersecurity MistakesCommon Cybersecurity Mistakes
Common Cybersecurity Mistakes
 
The Future's so Bright or is it?
The Future's so Bright or is it? The Future's so Bright or is it?
The Future's so Bright or is it?
 
6 Small Business Safety Hazards (And How to Avoid Them)
6 Small Business Safety Hazards (And How to Avoid Them)6 Small Business Safety Hazards (And How to Avoid Them)
6 Small Business Safety Hazards (And How to Avoid Them)
 
6 Small Business Safety Hazards (And How to Avoid Them)
6 Small Business Safety Hazards (And How to Avoid Them)6 Small Business Safety Hazards (And How to Avoid Them)
6 Small Business Safety Hazards (And How to Avoid Them)
 
Alphaeon Beauty Eyelash Serum
Alphaeon Beauty Eyelash SerumAlphaeon Beauty Eyelash Serum
Alphaeon Beauty Eyelash Serum
 
The Fiction behind IT Security Confidence
The Fiction behind IT Security ConfidenceThe Fiction behind IT Security Confidence
The Fiction behind IT Security Confidence
 
State of The Industry Presented By Grapeshot, Digiday Programmatic Summit, Ma...
State of The Industry Presented By Grapeshot, Digiday Programmatic Summit, Ma...State of The Industry Presented By Grapeshot, Digiday Programmatic Summit, Ma...
State of The Industry Presented By Grapeshot, Digiday Programmatic Summit, Ma...
 
postcard example
postcard examplepostcard example
postcard example
 
Bug Bounty Tipping Point: Strength in Numbers
Bug Bounty Tipping Point: Strength in NumbersBug Bounty Tipping Point: Strength in Numbers
Bug Bounty Tipping Point: Strength in Numbers
 
7 Undeniable Truths to Making Software Security Better
7 Undeniable Truths to Making Software Security Better7 Undeniable Truths to Making Software Security Better
7 Undeniable Truths to Making Software Security Better
 
AppSecUSA 2016: 'Your License for Bug Hunting Season'
AppSecUSA 2016: 'Your License for Bug Hunting Season'AppSecUSA 2016: 'Your License for Bug Hunting Season'
AppSecUSA 2016: 'Your License for Bug Hunting Season'
 
Fueling Innovation in the Government through Startups
Fueling Innovation in the Government through StartupsFueling Innovation in the Government through Startups
Fueling Innovation in the Government through Startups
 
Top Stressors on Canadian CIOs and Tech Pros
Top Stressors on Canadian CIOs and Tech Pros Top Stressors on Canadian CIOs and Tech Pros
Top Stressors on Canadian CIOs and Tech Pros
 
Telindus cybersecurity survey_report_2019
Telindus cybersecurity survey_report_2019Telindus cybersecurity survey_report_2019
Telindus cybersecurity survey_report_2019
 
Is Wearable Technology part of your Daily Life?
Is Wearable Technology part of your Daily Life?Is Wearable Technology part of your Daily Life?
Is Wearable Technology part of your Daily Life?
 
Mobile network connection map
Mobile network connection mapMobile network connection map
Mobile network connection map
 

Similar to SolarWinds MSP 2017 Cyber Security Report

Symantec - State of European Data Privacy
Symantec - State of European Data PrivacySymantec - State of European Data Privacy
Symantec - State of European Data PrivacySymantec
 
InsurTech & Connected Insurance Survey Results
InsurTech & Connected Insurance Survey ResultsInsurTech & Connected Insurance Survey Results
InsurTech & Connected Insurance Survey ResultsInsurtechNews.com
 
Flash Fires: Crisis Communications in the Age of NOW
Flash Fires: Crisis Communications in the Age of NOWFlash Fires: Crisis Communications in the Age of NOW
Flash Fires: Crisis Communications in the Age of NOWSandra Fathi
 
Crisis Communications in the Age of Now: 2016 PRSA Tri-State Conference
Crisis Communications in the Age of Now: 2016 PRSA Tri-State ConferenceCrisis Communications in the Age of Now: 2016 PRSA Tri-State Conference
Crisis Communications in the Age of Now: 2016 PRSA Tri-State ConferenceCooperatize
 
2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research UpdateGridCyberSec
 
2016 Global data valuation survey
2016 Global data valuation survey2016 Global data valuation survey
2016 Global data valuation surveyBrunswick Group
 
Insights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportInsights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportStephanie Brannan
 
Unrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALUnrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALWayne Anderson
 
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation Luca Moroni ✔✔
 
Threat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceThreat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceSolarWinds
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionNetskope
 
Telindus cybersecurity survey_report_2019
Telindus cybersecurity survey_report_2019Telindus cybersecurity survey_report_2019
Telindus cybersecurity survey_report_2019Pierre-Yves COLLIN
 
Aon 2013 Global Risk Management Survey
Aon 2013 Global Risk Management SurveyAon 2013 Global Risk Management Survey
Aon 2013 Global Risk Management SurveyAon Nederland
 
People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsurancePeople First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsuranceAccenture México
 
Making Sense of Drone Market Forecasts: 2016 and Beyond
Making Sense of Drone Market Forecasts: 2016 and BeyondMaking Sense of Drone Market Forecasts: 2016 and Beyond
Making Sense of Drone Market Forecasts: 2016 and BeyondColin Snow
 
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataAchieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataEnterprise Management Associates
 
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...ARC Advisory Group
 

Similar to SolarWinds MSP 2017 Cyber Security Report (20)

Symantec - State of European Data Privacy
Symantec - State of European Data PrivacySymantec - State of European Data Privacy
Symantec - State of European Data Privacy
 
InsurTech & Connected Insurance Survey Results
InsurTech & Connected Insurance Survey ResultsInsurTech & Connected Insurance Survey Results
InsurTech & Connected Insurance Survey Results
 
Flash Fires: Crisis Communications in the Age of NOW
Flash Fires: Crisis Communications in the Age of NOWFlash Fires: Crisis Communications in the Age of NOW
Flash Fires: Crisis Communications in the Age of NOW
 
Crisis Communications in the Age of Now: 2016 PRSA Tri-State Conference
Crisis Communications in the Age of Now: 2016 PRSA Tri-State ConferenceCrisis Communications in the Age of Now: 2016 PRSA Tri-State Conference
Crisis Communications in the Age of Now: 2016 PRSA Tri-State Conference
 
2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update
 
6.4_From Resiliency to Solvency_Horne_EPRI/SNL Microgrid Symposium
6.4_From Resiliency to Solvency_Horne_EPRI/SNL Microgrid Symposium6.4_From Resiliency to Solvency_Horne_EPRI/SNL Microgrid Symposium
6.4_From Resiliency to Solvency_Horne_EPRI/SNL Microgrid Symposium
 
2016 Global data valuation survey
2016 Global data valuation survey2016 Global data valuation survey
2016 Global data valuation survey
 
Insights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportInsights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense Report
 
Unrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALUnrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINAL
 
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
 
Threat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceThreat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security Conference
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
8 BYOD Security Tips
8 BYOD Security Tips8 BYOD Security Tips
8 BYOD Security Tips
 
Telindus cybersecurity survey_report_2019
Telindus cybersecurity survey_report_2019Telindus cybersecurity survey_report_2019
Telindus cybersecurity survey_report_2019
 
Aon 2013 Global Risk Management Survey
Aon 2013 Global Risk Management SurveyAon 2013 Global Risk Management Survey
Aon 2013 Global Risk Management Survey
 
People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsurancePeople First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital Insurance
 
Making Sense of Drone Market Forecasts: 2016 and Beyond
Making Sense of Drone Market Forecasts: 2016 and BeyondMaking Sense of Drone Market Forecasts: 2016 and Beyond
Making Sense of Drone Market Forecasts: 2016 and Beyond
 
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataAchieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
 
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
 
5 Essential Security Tips for Startups
5 Essential Security Tips for Startups5 Essential Security Tips for Startups
5 Essential Security Tips for Startups
 

Recently uploaded

In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsVlad Stirbu
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 

Recently uploaded (20)

In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

SolarWinds MSP 2017 Cyber Security Report

  • 1. SOLA RW IN D S MSP 2017 C YB ER SEC U R ITY R EPOR T: C OU LD OVER C ON FID EN C E LEA D TO A N EXTIN C TION EVEN T?
  • 2. © 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved. SOLARWINDS MSP 2017 CYBERSECURITY SURVEY RESULTS • How do businesses feel about their cybersecurity? • And what’s the reality? • We interviewed 400 businesses across the US and UK, with a healthy mix of SMBs and enterprises. • Here’s what they said… and what they don’t see…
  • 3. © 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved. WHAT THEY SAY ABOUT CYBERSECURITY 87% of organizations have confidence in their cybersecurity
  • 4. © 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved. SHOULD THEY BE THAT CONFIDENT? 71% reported at least one breach in the previous 12 months (up from 29% the year prior)
  • 5. © 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved. THE CONSEQUENCES COULD HURT THEIR WALLETS $76K* for SMBs $939Kfor larger enterprises (Don’t forget the hit to their reputations) * Based on our own investigation data combined with IBM/Ponemon 2016 study
  • 6. © 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved. WHAT SHOULD THEY DO? Avoid the seven pitfalls we found during our research
  • 7. © 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved. PITFALL 1: INCONSISTENCY 68% don’t reliably enforce or audit security processes
  • 8. © 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved. PITFALL 2: NEGLIGENCE Only 16% considered user training a priority
  • 9. © 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved. PITFALL 3: SHORTSIGHTEDNESS The majority of respondents don’t stretch beyond the top three technological security techniques
  • 10. © 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved. PITFALL 4: COMPLACENCY Only 29% felt their reporting was “robust” (most felt it was just “adequate”)
  • 11. © 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved. PITFALL 5: INFLEXIBILITY Only 44% rolled out new tech in response to a breach
  • 12. © 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved. PITFALL 6: STAGNATION Fewer than 50% adopted the nine leading prevention techniques
  • 13. © 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved. PITFALL 7: LETHARGY 40% took longer to detect issues 44% took longer to respond to issues 46% took longer to resolve issues
  • 14. © 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved. STAY SAFE OUT THERE: THE BAD GUYS ARE CLOSER THAN YOU THINK Key takeaways: • No matter how confident you are, you may be vulnerable • Attacks and breaches are on the rise • Look for the seven pitfalls in your own security Download our full report for the full data: http://pages.solarwindsmsp.com/lp-cybersecurity-survey-msps.html
  • 15. © 2016 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All rights reserved. HOW WE CAN HELP SolarWinds MSP helps you deploy a comprehensive, layered approach to cybersecurity, including: • Antivirus • Web protection • Email protection • Backup and recovery • Data breach risk intelligence To learn more, please visit www.solarwindsmsp.com/

Editor's Notes

  1. This should be a generic background image. This slide could be left as is.
  2. Image suggestion: Show someone super confident.
  3. Image suggestion: Have the same person from the previous image, but pan it out to show that there’s a disaster of some kind behind. Ideas here would be a tornado or a guy looking menacing in a hoodie (similar to our standard hacker-wear).
  4. Image suggestion: I’m tempted to say something around money here, however, I think it may conflict with the actual text on the slide. Instead, I’d go with a generic background image that fits the theme and coloring of the rest of the presentation.
  5. Show an image of an obstacle to avoid. We could show: a hole in the road, a car avoiding traffic cones, or even quicksand.
  6. Image suggestion: We could go with something about inconsistency here, perhaps with a generic image that shows a pattern with something out of place. However, I think we should play off the idea of “enforcement” and show a police officer or a crossing guard: https://www.shutterstock.com/image-photo/friendly-school-crossing-guard-holding-stop-2584493?src=lB3pOhkF6L-Lo0adPLKU2g-1-15. A soccer/football referee showing a yellow card may also work here.
  7. Image suggestion: This one should either show the idea of negligence, perhaps someone dropping a vase or a broken cup (https://www.shutterstock.com/image-photo/broken-cup-spilled-yogurt-on-floor-501658378?src=tbdbo1QWMESHjxjY3TzEmg-1-9). Also, we could focus on the user training aspect and show people in a classroom or a boardroom.
  8. Image suggestions: This could be focused on shortsightedness, showing someone with thick glasses or show someone with binoculars (which is the opposite I guess, but it might still work) – this image could work: https://www.shutterstock.com/image-photo/glasses-laying-on-table-forest-521251693?src=omH2EElvG39k7wwBqym6Iw-1-11. Another option would be to play on the word “stretch” to show people stretching, doing yoga, or just reaching for something high up: https://www.shutterstock.com/image-photo/cute-little-boy-reaching-chocolate-chip-596595923?src=2ToQzDwgbKpfu-qxsZSvhg-1-3
  9. Image suggestion: For this one, we can use complacency by showing someone bored or asleep: https://www.shutterstock.com/image-photo/portrait-asian-boy-glasses-showing-very-454434301?src=HdcJLnUHgbyZ3pLWMTilPg-1-0; https://www.shutterstock.com/image-photo/bored-young-couple-sitting-on-couch-383609056?src=HdcJLnUHgbyZ3pLWMTilPg-1-6 Another option would be to focus on a generic report or chart.
  10. Image suggestion: This one should probably be directly about inflexibility. I think the best bet is to show people who are stubborn (https://www.shutterstock.com/image-photo/dont-want-listen-anymore-291870242?src=1LHm3rSG3NA6HQ2_ujPe9A-1-3; https://www.shutterstock.com/image-photo/stubbornsadupset-little-boychild-isolated-over-grey-273464927?src=1LHm3rSG3NA6HQ2_ujPe9A-1-1).
  11. Image suggestion: This one could be about stagnation. This might work: https://www.shutterstock.com/image-photo/guy-will-rows-home-shore-paddle-144752431?src=KoRO4-1ZlnnShG9IUFu0EQ-1-76. For prevention, we could show a sports person with pads and a helmet or we could show a doctor’s visit: https://www.shutterstock.com/image-photo/closeup-female-doctor-checking-blood-pressure-286865699?src=spOy2FXK4NVhFgl_vNULbw-1-6.
  12. Image suggestion: This one really has to be about lethargy. Show someone falling asleep at their desk. Or someone who’s lazy. I love this one: https://www.shutterstock.com/search?searchterm=lazy&search_source=base_search_form&language=en&page=1&sort=popular&image_type=all&safe=true – another option: https://www.shutterstock.com/image-photo/freelancer-girl-tired-fell-asleep-work-546426157?src=aVIXaZHWjqQc2DgkRTXMcQ-1-0 Don’t use this, but I love this image: https://www.shutterstock.com/image-photo/lazy-cat-basking-sun-on-street-375921865?src=JOpw75A3hQcOQ3HFhqsFyA-1-3
  13. Image suggestion: Let’s just have a generic background on this that fits with the rest of the presentation.
  14. Image suggestion: I think we should just stick with this background. We could use a colorful background that fits with the rest of the presentation as well.