SlideShare a Scribd company logo
What Cybercriminals Want: Company Data
Extremely secure
SUMMARY
1. Introduction
2. The What, Why and Wherefore of Data Loss
3. How Do Cybercriminals Steal Data ?
4. How the Loss of Company Data Affects your Business
5. How to Protect your Company Data
Page 2Cybersecurity
1. INTRODUCTION
Page 3Cybersecurity
Data is big, data is valuable and data is trouble.
Data loss affects all of us, as individuals and within an
organization. It affects all types of companies no
matter what size they are.
Data loss and theft are the most common types of
cybercrime according to PWC.
The UK is the worst hit nation in Europe with 93% of
large UK organizations reporting a breach in 2013.
78%
more breaches have been
recorded in 2014
by Breach Level Index.
340 million
breaches have been
recorded in the first
two quarters of 2015.
1. INTRODUCTION
Page 4Cybersecurity
Data loss and theft are the most common types
of cybercrime according to PWC.
The top four types of security incidents are:
 Computer records compromised
 Employee records compromised
 Loss or damage of internal records
 Loss of intellectual property
According to report from the Global State of Information Security 2016.
Cybersecurity
1. INTRODUCTION
5
One of the biggest and most far reaching was the health care insurance provider
Anthem, where a breach in late 2014 impacted almost 80 million customer records.
Carphone Warehouse and partner Experian lost the personal data
of 2.4 million customers.
2015 was a year marked by high levels of data loss and theft.
All market sectors are being targeted and there are many examples
within the healthcare, financial and government sectors.
In Germany almost 18 million personal details of German citizens
were stolen from the server of German Bundestag
Cybersecurity
2. THE WHAT, WHY AND WHEREFORE OF DATA LOSS
6
Price Waterhouse Coopers estimated that the loss of trade secrets (IP) may be as high as
$2.2 trillion annually. Over the same period, they found that IP theft increased by 56%
in 2015.
Cyberespionage / Intellectual Property theft
Company financial details
There are a number of methods that are used to obtain access to company bank
accounts. One example is shown in a recent FBI warning about company bank fraud,
perpetrated by business email account being compromised.
Cybersecurity
2. THE WHAT, WHY AND WHEREFORE OF DATA LOSS
7
This is becoming an increasing problem as PII is being used for web services as a method
of identification and for identity assurance purposes.
This means that once an individual’s personal information is out for sale on the
cybercrime black market, it can be used for other attacks as was seen in the IRS exploit.
Personally Identifying Information - PII / identity theft
Data records
Data records are distinct from PII and can contain proprietary company information or
items such as medical scans and so on.
Stolen records can go onto the black market, fetching hundreds of dollars per record. The
average cost of a health record, for example is $363.
Cybersecurity
3. HOW DO CYBERCRIMINALS STEAL DATA?
8
Tactics used
to exploit
information
Advanced Persistent
Threat (APT)
Phishing and spear
phishing
Insider Threat
Malware
Cybersecurity
3. HOW DO CYBERCRIMINALS STEAL DATA?
9
This takes the form of a long lasting and slow exfiltration of data. It is most
commonly used to extract proprietary information, such as intellectual property.
An example of such an attack was performed on Google in 2009.
In this attack, nicknamed « Operation Aurora », it was alleged that Chinese
hackers (possibly government sponsored) were behind the attack on the company’s
intellectual property.
The APT was a typical attack where malware used a software vulnerability,
known as a zero day exploit, which is where a software vulnerability is unknown to
the vendor and therefore remains vulnerable.
The malware then sent data back to a « command and control » center operated by
hackers. APT’s can lay undetected for long periods, during which time they send
stolen information back to the central command center.
Advanced Persistent Threat (APT)
Cybersecurity
3. HOW DO CYBERCRIMINALS STEAL DATA?
1
0
Phishing is one of the most popular methods
of getting malware onto a computer.
It was estimated in a report « State of the
Phish » that in 2013-14, 95% of all
cyberespionage attacks and 80% of all malware
infections originated in a phishing or spear
phishing email.
Once infected, malware or spoof websites are
used to exfiltrate data, including login
credentials for company resources such as
databases.
Phishing and spear phishing
Cybersecurity
3. HOW DO CYBERCRIMINALS STEAL DATA?
1
1
This type of threat covers a gamut of issues,
both malicious and non-malicious.
Simple loss of data due to carelessness is a
continuing problem for companies.
Simple mis-delivery of emails, for example,
causes up to 44% of data disclosure errors
according to a Verizon report.
Insider threat
Cybersecurity
3. HOW DO CYBERCRIMINALS STEAL DATA?
1
2
One particularly sinister form of malware is ransomware.
This is where the malware encrypts your data, not only on your hard drive, but
potentially out into the network and even Cloud storage.
Once encrypted the cybercriminal presents a screen asking for money and if you
pay up they « promise » to decrypt the data.
Ransomware has exploded recently, up by 165% according to McAfee. And the costs
for this type of malware, alone, were around $18 million in 2014.
Malware
Cybersecurity
4. HOW THE LOSS OF COMPANY DATA AFFECTS YOUR BUSINESS
1
3
Loss of data isn’t just about the financial
implications of the loss. It also affects your
company brand and reputation.
And fines for non-compliance when customer
records and PII are stolen are becoming more
common place and also affect company
directors.
And data protection laws, which exist in most
countries, are applied to company directors
resulting in large fines.
Cybersecurity
4. HOW THE LOSS OF COMPANY DATA AFFECTS YOUR BUSINESS
1
4
In the UK the Ministry of Justice was fined £180,000 for the loss of almost
19,000 prison records when an unencrypted and non-password protected
portable hard drive went missing.
In the USA, the Target breach of late 2013 which saw the loss of around 40
million customer card details and 70 million customers PII, resulted in a
suite of class actions against the company.
The U.S. Federal Trade Commission has a specific clause in their Act for Unfair or
Deceptive Acts or Practices, which allows them to go after the directors of a
company who haven’t used sufficient protection to prevent a loss of
customer data.
Cybersecurity
5. HOW TO PROTECT YOUR COMPANY DATA
1
5
There are mechanisms and tools that can help you minimize the risks coming your way
from cybercriminals and even from accidental data loss by employees.
Understand how your data flows within your organization – both
internally and with the outside world, especially via the Internet.
Mapping your data flows is a fundamental part of your security
strategy and will allow you to create a game plan for data protection.
Take the form of employee education, to allow, for example a
person to recognize a phishing attempt.
Using the right tools for the job is also an integral part of your
overall security strategy for data protection.
Protecting application and data access - many data breaches
start with the loss or theft of credentials.
company/united-security-providers
companies/unitedsecurityprovidersag
https://www.united-security-providers.ch

More Related Content

What's hot

IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
thinkASG
 
Critical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachCritical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target Breach
Teri Radichel
 
Jitter Bugslec
Jitter BugslecJitter Bugslec
Jitter Bugslec
scottdp3
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
VidaB
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
Mark Albala
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
Shawn Crimson
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
Eddie Hirst MSc MSyl
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Target Breach Analysis
Target Breach AnalysisTarget Breach Analysis
Target Breach Analysis
Tal Be'ery
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
Charlie Lewis M.S.
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
lior mazor
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Intellias
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
spencerharry
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
Charlie Lewis M.S.
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
Charles Mok
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
Entersoft Security
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Goutama Bachtiar
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
- Mark - Fullbright
 

What's hot (20)

IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
 
Critical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachCritical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target Breach
 
Jitter Bugslec
Jitter BugslecJitter Bugslec
Jitter Bugslec
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Target Breach Analysis
Target Breach AnalysisTarget Breach Analysis
Target Breach Analysis
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 

Viewers also liked

Managing the Cyberthreat Landscape
Managing the Cyberthreat LandscapeManaging the Cyberthreat Landscape
Managing the Cyberthreat Landscape
AT&T
 
How to commit corporate espionage (10 Card Deck)
How to commit corporate espionage (10 Card Deck)How to commit corporate espionage (10 Card Deck)
How to commit corporate espionage (10 Card Deck)
Amanda Abelove
 
Présentation - atelier War Room
Présentation - atelier War RoomPrésentation - atelier War Room
Présentation - atelier War Room
Emilie Dutil-Bruneau
 
Corporate espionage
Corporate espionageCorporate espionage
Corporate espionage
valkoinen_lumi
 
The Effect Of Lack Of Security On Industry
The Effect Of Lack Of Security On IndustryThe Effect Of Lack Of Security On Industry
The Effect Of Lack Of Security On Industry
lilian91
 
What is your Intellectual Property Worth? Methods for Determining Value
What is your Intellectual Property Worth? Methods for Determining ValueWhat is your Intellectual Property Worth? Methods for Determining Value
What is your Intellectual Property Worth? Methods for Determining Value
CONSOR Intellectual Asset Management
 
Corporate-Espionage
Corporate-EspionageCorporate-Espionage
Corporate-Espionage
Sam
 
Information security threats
Information security threatsInformation security threats
Information security threats
complianceonline123
 
Trade Secrets 2011 University Basics
Trade Secrets 2011 University Basics Trade Secrets 2011 University Basics
Trade Secrets 2011 University Basics
MacMillan, Sobanski and Todd, LLC.
 

Viewers also liked (9)

Managing the Cyberthreat Landscape
Managing the Cyberthreat LandscapeManaging the Cyberthreat Landscape
Managing the Cyberthreat Landscape
 
How to commit corporate espionage (10 Card Deck)
How to commit corporate espionage (10 Card Deck)How to commit corporate espionage (10 Card Deck)
How to commit corporate espionage (10 Card Deck)
 
Présentation - atelier War Room
Présentation - atelier War RoomPrésentation - atelier War Room
Présentation - atelier War Room
 
Corporate espionage
Corporate espionageCorporate espionage
Corporate espionage
 
The Effect Of Lack Of Security On Industry
The Effect Of Lack Of Security On IndustryThe Effect Of Lack Of Security On Industry
The Effect Of Lack Of Security On Industry
 
What is your Intellectual Property Worth? Methods for Determining Value
What is your Intellectual Property Worth? Methods for Determining ValueWhat is your Intellectual Property Worth? Methods for Determining Value
What is your Intellectual Property Worth? Methods for Determining Value
 
Corporate-Espionage
Corporate-EspionageCorporate-Espionage
Corporate-Espionage
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Trade Secrets 2011 University Basics
Trade Secrets 2011 University Basics Trade Secrets 2011 University Basics
Trade Secrets 2011 University Basics
 

Similar to What Cybercriminals Want: Company Data – by United Security Providers

DATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali RangoliyaDATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali Rangoliya
NSConclave
 
Cyber security
Cyber securityCyber security
Cyber security
Satbharai Sethar
 
White Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US LocalizedWhite Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US Localized
Stuart Clarke
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
mharbpavia
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
jsnyder40
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
Camilo do Carmo Pinto
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
IJERD Editor
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
Kalilur Rahman
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattsson
Ulf Mattsson
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
MAXfocus
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of Hacking
Daniel Ross
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
at MicroFocus Italy ❖✔
 
Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WP
Philippe Boivineau
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
Stephanie Holman
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
tidwellveronique
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
NetIQ
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
Michele Thomas
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
SensePost
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
Ulf Mattsson
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
Patrick Bouillaud
 

Similar to What Cybercriminals Want: Company Data – by United Security Providers (20)

DATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali RangoliyaDATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali Rangoliya
 
Cyber security
Cyber securityCyber security
Cyber security
 
White Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US LocalizedWhite Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US Localized
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattsson
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of Hacking
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
 
Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WP
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 

Recently uploaded

存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 

Recently uploaded (20)

存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 

What Cybercriminals Want: Company Data – by United Security Providers

  • 1. What Cybercriminals Want: Company Data Extremely secure
  • 2. SUMMARY 1. Introduction 2. The What, Why and Wherefore of Data Loss 3. How Do Cybercriminals Steal Data ? 4. How the Loss of Company Data Affects your Business 5. How to Protect your Company Data Page 2Cybersecurity
  • 3. 1. INTRODUCTION Page 3Cybersecurity Data is big, data is valuable and data is trouble. Data loss affects all of us, as individuals and within an organization. It affects all types of companies no matter what size they are. Data loss and theft are the most common types of cybercrime according to PWC. The UK is the worst hit nation in Europe with 93% of large UK organizations reporting a breach in 2013. 78% more breaches have been recorded in 2014 by Breach Level Index. 340 million breaches have been recorded in the first two quarters of 2015.
  • 4. 1. INTRODUCTION Page 4Cybersecurity Data loss and theft are the most common types of cybercrime according to PWC. The top four types of security incidents are:  Computer records compromised  Employee records compromised  Loss or damage of internal records  Loss of intellectual property According to report from the Global State of Information Security 2016.
  • 5. Cybersecurity 1. INTRODUCTION 5 One of the biggest and most far reaching was the health care insurance provider Anthem, where a breach in late 2014 impacted almost 80 million customer records. Carphone Warehouse and partner Experian lost the personal data of 2.4 million customers. 2015 was a year marked by high levels of data loss and theft. All market sectors are being targeted and there are many examples within the healthcare, financial and government sectors. In Germany almost 18 million personal details of German citizens were stolen from the server of German Bundestag
  • 6. Cybersecurity 2. THE WHAT, WHY AND WHEREFORE OF DATA LOSS 6 Price Waterhouse Coopers estimated that the loss of trade secrets (IP) may be as high as $2.2 trillion annually. Over the same period, they found that IP theft increased by 56% in 2015. Cyberespionage / Intellectual Property theft Company financial details There are a number of methods that are used to obtain access to company bank accounts. One example is shown in a recent FBI warning about company bank fraud, perpetrated by business email account being compromised.
  • 7. Cybersecurity 2. THE WHAT, WHY AND WHEREFORE OF DATA LOSS 7 This is becoming an increasing problem as PII is being used for web services as a method of identification and for identity assurance purposes. This means that once an individual’s personal information is out for sale on the cybercrime black market, it can be used for other attacks as was seen in the IRS exploit. Personally Identifying Information - PII / identity theft Data records Data records are distinct from PII and can contain proprietary company information or items such as medical scans and so on. Stolen records can go onto the black market, fetching hundreds of dollars per record. The average cost of a health record, for example is $363.
  • 8. Cybersecurity 3. HOW DO CYBERCRIMINALS STEAL DATA? 8 Tactics used to exploit information Advanced Persistent Threat (APT) Phishing and spear phishing Insider Threat Malware
  • 9. Cybersecurity 3. HOW DO CYBERCRIMINALS STEAL DATA? 9 This takes the form of a long lasting and slow exfiltration of data. It is most commonly used to extract proprietary information, such as intellectual property. An example of such an attack was performed on Google in 2009. In this attack, nicknamed « Operation Aurora », it was alleged that Chinese hackers (possibly government sponsored) were behind the attack on the company’s intellectual property. The APT was a typical attack where malware used a software vulnerability, known as a zero day exploit, which is where a software vulnerability is unknown to the vendor and therefore remains vulnerable. The malware then sent data back to a « command and control » center operated by hackers. APT’s can lay undetected for long periods, during which time they send stolen information back to the central command center. Advanced Persistent Threat (APT)
  • 10. Cybersecurity 3. HOW DO CYBERCRIMINALS STEAL DATA? 1 0 Phishing is one of the most popular methods of getting malware onto a computer. It was estimated in a report « State of the Phish » that in 2013-14, 95% of all cyberespionage attacks and 80% of all malware infections originated in a phishing or spear phishing email. Once infected, malware or spoof websites are used to exfiltrate data, including login credentials for company resources such as databases. Phishing and spear phishing
  • 11. Cybersecurity 3. HOW DO CYBERCRIMINALS STEAL DATA? 1 1 This type of threat covers a gamut of issues, both malicious and non-malicious. Simple loss of data due to carelessness is a continuing problem for companies. Simple mis-delivery of emails, for example, causes up to 44% of data disclosure errors according to a Verizon report. Insider threat
  • 12. Cybersecurity 3. HOW DO CYBERCRIMINALS STEAL DATA? 1 2 One particularly sinister form of malware is ransomware. This is where the malware encrypts your data, not only on your hard drive, but potentially out into the network and even Cloud storage. Once encrypted the cybercriminal presents a screen asking for money and if you pay up they « promise » to decrypt the data. Ransomware has exploded recently, up by 165% according to McAfee. And the costs for this type of malware, alone, were around $18 million in 2014. Malware
  • 13. Cybersecurity 4. HOW THE LOSS OF COMPANY DATA AFFECTS YOUR BUSINESS 1 3 Loss of data isn’t just about the financial implications of the loss. It also affects your company brand and reputation. And fines for non-compliance when customer records and PII are stolen are becoming more common place and also affect company directors. And data protection laws, which exist in most countries, are applied to company directors resulting in large fines.
  • 14. Cybersecurity 4. HOW THE LOSS OF COMPANY DATA AFFECTS YOUR BUSINESS 1 4 In the UK the Ministry of Justice was fined £180,000 for the loss of almost 19,000 prison records when an unencrypted and non-password protected portable hard drive went missing. In the USA, the Target breach of late 2013 which saw the loss of around 40 million customer card details and 70 million customers PII, resulted in a suite of class actions against the company. The U.S. Federal Trade Commission has a specific clause in their Act for Unfair or Deceptive Acts or Practices, which allows them to go after the directors of a company who haven’t used sufficient protection to prevent a loss of customer data.
  • 15. Cybersecurity 5. HOW TO PROTECT YOUR COMPANY DATA 1 5 There are mechanisms and tools that can help you minimize the risks coming your way from cybercriminals and even from accidental data loss by employees. Understand how your data flows within your organization – both internally and with the outside world, especially via the Internet. Mapping your data flows is a fundamental part of your security strategy and will allow you to create a game plan for data protection. Take the form of employee education, to allow, for example a person to recognize a phishing attempt. Using the right tools for the job is also an integral part of your overall security strategy for data protection. Protecting application and data access - many data breaches start with the loss or theft of credentials.