SlideShare a Scribd company logo
THE DARK SIDE
OF THE WEB
Q4 2014 Published Q1 2015
we create as much information as we did
from the dawn of human civilization up until 2003
EVERY 2 DAYS
does William Shatner wear a toupee?
Google now searches
35 TRILLION WEBPAGES
That’s 4,375 times the size of the web just 10 years ago
And there are thousands of cloud apps
that can make you more productive
The average employee uses
27 apps at work
Collaboration
Social Media
Content Sharing
File Sharing
Business Intelligence
Other
HERE ARE SOME OF THE TOP APPS IN USE
1. Dropbox
2. Google Drive
3. Box
4. OneDrive
5. ShareFile
6. Yandex.Disk
7. Hightail
8. 4shared
9. Firedrive
10. Zippyshare
TOP
SERVICES
by category
FILE SHARING COLLABORATION SOCIAL MEDIA
1.
2. Gmail
3. Yammer
4. Yahoo! Mail
5. Cisco WebEx
6. Google Apps
7. Skype
8. Evernote
9. Prezi
10. GoToMeeting
Microsoft
Office 365
1. Facebook
2. Twitter
3. LinkedIn
4. Tumblr
5. Sina Weibo
6. VK
7. Foursquare
8. Badoo
9. LiveJournal
10. Renren
THESE FILE-SHARING
APPS ARE NOW THE
HOME OF SENSITIVE DATA
of files uploaded to file-sharing
services contain sensitive data
of users have uploaded sensitive
data to a file-sharing service22% 37%
DOWNLOAD NOW
CLOUD ADOPTION
& RISK REPORT
Q3 2014
Published Q4 2014
Download the Full Report
Get the full report with
detailed statistics on the
top cloud services,
fastest growing apps,
and risks you can avoid
in the cloud.
CLOUD ADOPTION
& RISK REPORT
Q4 2014
Published Q1 2015
It’s estimated the “dark web” or “deep web” is 500
times larger than what’s searchable by Google
THE REACH AND ANONYMITY OF
THE WEB MAKE ITS DARK
CORNERS THE PERFECT BLACK MARKET
ON DARK WEB MARKETPLACES
SUCH AS THE NOW-DEFUNCT
SILK ROAD, YOU CAN BUY:
DRUGS
WEAPONS
HITMEN
FORGED
PASSPORTS
YOU CAN ALSO BUY STOLEN
LOGIN CREDENTIALS
PASSWORD
**********
HOW BIG IS THIS PROBLEM?
OF COMPANIES HAVE AT LEAST 1 EMPLOYEE
WITH COMPROMISED CREDENTIALS92%
One Fortune 500 company has
10,155 compromised credentials
including file sharing, collaboration,
CRM, and financial applications
AND 12% OF ALL USERS HAVE AT LEAST
ONE COMPROMISED CREDENTIAL
Financial
Government
Healthcare
High tech
Manufacturing
Media
Pharmaceutical
Real estate
Telecommunications
Utilities
Energy
9%
6%
5%
15%
9%
14%
12%
19%
9%
18%
11%
% of employees with at least one password stolen
INDUSTRIES
MOST EXPOSED
TO COMPROMISED
ACCOUNTS
Tip: to limit your exposure don’t be one of the 31%
of people who reuse passwords across apps
Use a strong, unique password for every single app and change
the most important ones every 3 months
DOWNLOAD NOW
CLOUD ADOPTION
& RISK REPORT
Q3 2014
Published Q4 2014
Download the Full Report
Get the full report with
detailed statistics on the
top cloud services,
fastest growing apps,
and risks you can avoid
in the cloud.
CLOUD ADOPTION
& RISK REPORT
Q4 2014
Published Q1 2015

More Related Content

What's hot

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
Citrix
 
BeYOnD BYOD
BeYOnD BYODBeYOnD BYOD
BeYOnD BYOD
harmon.ie
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Citrix
 
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportSummer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud Report
Netskope
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
IBM Security
 
[Infographic] Productivity in the Cloud
[Infographic] Productivity in the Cloud[Infographic] Productivity in the Cloud
[Infographic] Productivity in the Cloud
RapidScale
 
Megatrends and Data - Adapting to Disruption
Megatrends and Data - Adapting to DisruptionMegatrends and Data - Adapting to Disruption
Megatrends and Data - Adapting to Disruption
NetApp Australia & New Zealand
 
Cloud computing in Thailand readiness survey
Cloud computing in Thailand readiness surveyCloud computing in Thailand readiness survey
Cloud computing in Thailand readiness survey
IMC Institute
 
The attention economy and the internet
The attention economy and the internetThe attention economy and the internet
The attention economy and the internet
Ross Garrett
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
CloudLock
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityStop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
CloudLock
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes Mobile
NetApp
 
Predictions idc2013
Predictions idc2013Predictions idc2013
Predictions idc2013
Unesco Telemedicine
 
Ravi Namboori - Developing Cloud Applications In The New IT Era
Ravi Namboori - Developing Cloud Applications In The New IT EraRavi Namboori - Developing Cloud Applications In The New IT Era
Ravi Namboori - Developing Cloud Applications In The New IT Era
Ravi namboori
 
Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?
HostingCon
 
Top tips to develop your enterprise mobility strategy [Infographic]
Top tips to develop your enterprise mobility strategy [Infographic]Top tips to develop your enterprise mobility strategy [Infographic]
Top tips to develop your enterprise mobility strategy [Infographic]
Vodafone Business
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Black Duck by Synopsys
 
Importance of web application development
Importance of web application developmentImportance of web application development
Importance of web application development
Rahim Makhani
 
Codeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWSCodeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWS
CloudLock
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
IBM Security
 

What's hot (20)

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
 
BeYOnD BYOD
BeYOnD BYODBeYOnD BYOD
BeYOnD BYOD
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportSummer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud Report
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
[Infographic] Productivity in the Cloud
[Infographic] Productivity in the Cloud[Infographic] Productivity in the Cloud
[Infographic] Productivity in the Cloud
 
Megatrends and Data - Adapting to Disruption
Megatrends and Data - Adapting to DisruptionMegatrends and Data - Adapting to Disruption
Megatrends and Data - Adapting to Disruption
 
Cloud computing in Thailand readiness survey
Cloud computing in Thailand readiness surveyCloud computing in Thailand readiness survey
Cloud computing in Thailand readiness survey
 
The attention economy and the internet
The attention economy and the internetThe attention economy and the internet
The attention economy and the internet
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityStop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes Mobile
 
Predictions idc2013
Predictions idc2013Predictions idc2013
Predictions idc2013
 
Ravi Namboori - Developing Cloud Applications In The New IT Era
Ravi Namboori - Developing Cloud Applications In The New IT EraRavi Namboori - Developing Cloud Applications In The New IT Era
Ravi Namboori - Developing Cloud Applications In The New IT Era
 
Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?Are you ready for Hosting 3.0?
Are you ready for Hosting 3.0?
 
Top tips to develop your enterprise mobility strategy [Infographic]
Top tips to develop your enterprise mobility strategy [Infographic]Top tips to develop your enterprise mobility strategy [Infographic]
Top tips to develop your enterprise mobility strategy [Infographic]
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
 
Importance of web application development
Importance of web application developmentImportance of web application development
Importance of web application development
 
Codeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWSCodeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWS
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
 

Viewers also liked

How to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink YouHow to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink YouSkyhigh Networks
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
Skyhigh Networks
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaAsheem Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmSergio Loureiro
 
Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
Subra Kumaraswamy CISSP CISM
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - FranticMiika Puputti
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done Right
Skyhigh Networks
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs
HubSpot
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
Vladimir Jirasek
 

Viewers also liked (9)

How to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink YouHow to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink You
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - Frantic
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done Right
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 

Similar to The Dark Side of the Web

Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012
Philip Oakley
 
The Digital Workplace Revolution
The Digital Workplace RevolutionThe Digital Workplace Revolution
The Digital Workplace Revolution
Atlas Cloud
 
What is 'Cloud Computing'?
What is 'Cloud Computing'?What is 'Cloud Computing'?
What is 'Cloud Computing'?
CLASS Training
 
Cloud Computing - An Introduction to Cloud Computing Services
Cloud Computing - An Introduction to Cloud Computing ServicesCloud Computing - An Introduction to Cloud Computing Services
Cloud Computing - An Introduction to Cloud Computing Services
Streym IT Solutions
 
SxSW: Can we save the open web?
SxSW: Can we save the open web?SxSW: Can we save the open web?
SxSW: Can we save the open web?
Dries Buytaert
 
Can we save the open web?
Can we save the open web?Can we save the open web?
Can we save the open web?
Acquia
 
Employing cloud ian moyse - workbooks - whitepaper
Employing cloud   ian moyse - workbooks - whitepaperEmploying cloud   ian moyse - workbooks - whitepaper
Employing cloud ian moyse - workbooks - whitepaper
ITpreneurs
 
Why hybrid cloud continues to grow: A look at real use cases
Why hybrid cloud continues to grow: A look at real use casesWhy hybrid cloud continues to grow: A look at real use cases
Why hybrid cloud continues to grow: A look at real use cases
Tyrone Systems
 
Nonprofit and Library Technology Trends for 2019
Nonprofit and Library Technology Trends for 2019Nonprofit and Library Technology Trends for 2019
Nonprofit and Library Technology Trends for 2019
TechSoup
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 
Internet of Things - Industry Influence Study
Internet of Things - Industry Influence StudyInternet of Things - Industry Influence Study
Internet of Things - Industry Influence Study
Real-Time Innovations (RTI)
 
Secrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the sceneSecrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the scene
David Terrar
 
SUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of businessSUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of business
Mark Stokes
 
The 10 best performing document management solution providers 2018
The 10 best performing document management solution providers 2018The 10 best performing document management solution providers 2018
The 10 best performing document management solution providers 2018
Insights success media and technology pvt ltd
 
The Digital Marketing Revolution: 22 years in 16 charts
The Digital Marketing Revolution: 22 years in 16 chartsThe Digital Marketing Revolution: 22 years in 16 charts
The Digital Marketing Revolution: 22 years in 16 charts
Noreen Seebacher
 
Ap i ot_1407
Ap i ot_1407Ap i ot_1407
Ap i ot_1407
mantruvic
 
The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change) The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change)
Lori MacVittie
 
Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015
Prayukth K V
 
Six Sites Short
Six Sites ShortSix Sites Short
Six Sites Short
J.Seeverens
 

Similar to The Dark Side of the Web (20)

Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012
 
The Digital Workplace Revolution
The Digital Workplace RevolutionThe Digital Workplace Revolution
The Digital Workplace Revolution
 
What is 'Cloud Computing'?
What is 'Cloud Computing'?What is 'Cloud Computing'?
What is 'Cloud Computing'?
 
Cloud Computing - An Introduction to Cloud Computing Services
Cloud Computing - An Introduction to Cloud Computing ServicesCloud Computing - An Introduction to Cloud Computing Services
Cloud Computing - An Introduction to Cloud Computing Services
 
SxSW: Can we save the open web?
SxSW: Can we save the open web?SxSW: Can we save the open web?
SxSW: Can we save the open web?
 
Can we save the open web?
Can we save the open web?Can we save the open web?
Can we save the open web?
 
Employing cloud ian moyse - workbooks - whitepaper
Employing cloud   ian moyse - workbooks - whitepaperEmploying cloud   ian moyse - workbooks - whitepaper
Employing cloud ian moyse - workbooks - whitepaper
 
Why hybrid cloud continues to grow: A look at real use cases
Why hybrid cloud continues to grow: A look at real use casesWhy hybrid cloud continues to grow: A look at real use cases
Why hybrid cloud continues to grow: A look at real use cases
 
Nonprofit and Library Technology Trends for 2019
Nonprofit and Library Technology Trends for 2019Nonprofit and Library Technology Trends for 2019
Nonprofit and Library Technology Trends for 2019
 
Security that works
Security that worksSecurity that works
Security that works
 
Internet of Things - Industry Influence Study
Internet of Things - Industry Influence StudyInternet of Things - Industry Influence Study
Internet of Things - Industry Influence Study
 
5 tech trends to watch in 2011
5 tech  trends to watch in 20115 tech  trends to watch in 2011
5 tech trends to watch in 2011
 
Secrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the sceneSecrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the scene
 
SUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of businessSUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of business
 
The 10 best performing document management solution providers 2018
The 10 best performing document management solution providers 2018The 10 best performing document management solution providers 2018
The 10 best performing document management solution providers 2018
 
The Digital Marketing Revolution: 22 years in 16 charts
The Digital Marketing Revolution: 22 years in 16 chartsThe Digital Marketing Revolution: 22 years in 16 charts
The Digital Marketing Revolution: 22 years in 16 charts
 
Ap i ot_1407
Ap i ot_1407Ap i ot_1407
Ap i ot_1407
 
The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change) The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change)
 
Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015
 
Six Sites Short
Six Sites ShortSix Sites Short
Six Sites Short
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

The Dark Side of the Web

  • 1. THE DARK SIDE OF THE WEB Q4 2014 Published Q1 2015
  • 2. we create as much information as we did from the dawn of human civilization up until 2003 EVERY 2 DAYS
  • 3. does William Shatner wear a toupee? Google now searches 35 TRILLION WEBPAGES That’s 4,375 times the size of the web just 10 years ago
  • 4. And there are thousands of cloud apps that can make you more productive
  • 5. The average employee uses 27 apps at work Collaboration Social Media Content Sharing File Sharing Business Intelligence Other
  • 6. HERE ARE SOME OF THE TOP APPS IN USE
  • 7. 1. Dropbox 2. Google Drive 3. Box 4. OneDrive 5. ShareFile 6. Yandex.Disk 7. Hightail 8. 4shared 9. Firedrive 10. Zippyshare TOP SERVICES by category FILE SHARING COLLABORATION SOCIAL MEDIA 1. 2. Gmail 3. Yammer 4. Yahoo! Mail 5. Cisco WebEx 6. Google Apps 7. Skype 8. Evernote 9. Prezi 10. GoToMeeting Microsoft Office 365 1. Facebook 2. Twitter 3. LinkedIn 4. Tumblr 5. Sina Weibo 6. VK 7. Foursquare 8. Badoo 9. LiveJournal 10. Renren
  • 8. THESE FILE-SHARING APPS ARE NOW THE HOME OF SENSITIVE DATA of files uploaded to file-sharing services contain sensitive data of users have uploaded sensitive data to a file-sharing service22% 37%
  • 9. DOWNLOAD NOW CLOUD ADOPTION & RISK REPORT Q3 2014 Published Q4 2014 Download the Full Report Get the full report with detailed statistics on the top cloud services, fastest growing apps, and risks you can avoid in the cloud. CLOUD ADOPTION & RISK REPORT Q4 2014 Published Q1 2015
  • 10. It’s estimated the “dark web” or “deep web” is 500 times larger than what’s searchable by Google
  • 11. THE REACH AND ANONYMITY OF THE WEB MAKE ITS DARK CORNERS THE PERFECT BLACK MARKET
  • 12. ON DARK WEB MARKETPLACES SUCH AS THE NOW-DEFUNCT SILK ROAD, YOU CAN BUY: DRUGS WEAPONS HITMEN FORGED PASSPORTS
  • 13. YOU CAN ALSO BUY STOLEN LOGIN CREDENTIALS PASSWORD **********
  • 14. HOW BIG IS THIS PROBLEM?
  • 15. OF COMPANIES HAVE AT LEAST 1 EMPLOYEE WITH COMPROMISED CREDENTIALS92%
  • 16. One Fortune 500 company has 10,155 compromised credentials including file sharing, collaboration, CRM, and financial applications
  • 17. AND 12% OF ALL USERS HAVE AT LEAST ONE COMPROMISED CREDENTIAL
  • 19. Tip: to limit your exposure don’t be one of the 31% of people who reuse passwords across apps Use a strong, unique password for every single app and change the most important ones every 3 months
  • 20. DOWNLOAD NOW CLOUD ADOPTION & RISK REPORT Q3 2014 Published Q4 2014 Download the Full Report Get the full report with detailed statistics on the top cloud services, fastest growing apps, and risks you can avoid in the cloud. CLOUD ADOPTION & RISK REPORT Q4 2014 Published Q1 2015