Download presentation
Presentation is loading. Please wait.
Published bySibyl Washington Modified over 6 years ago
1
Cyber Crime & What It Means For Your Business
2
Peter Schaub: A Brief History
Peter J. Schaub founded NeoCertified Secure Communications in 2002. NeoCertified provides commercial-grade encryption to businesses, corporations, non-profit organizations, associations, and individuals. NeoCertified currently serves more than a half million users across all 50 states and is a recognized leader in the encryption industry. Peter is a thought leader in the digital security industry, having been featured on podcasts, blogs, and national events. He is also currently apart of the Metro State University board for Digital Security.
3
Cyber Crime “There is not a crime, there is not a dodge, there is not a trick, there is not a swindle, there is not a vice which does not live by secrecy.” Joseph Pulitzer
4
Cyber Crime: What Is It? Cyber crime is any form of attack, scam, hack, theft, breach, or piracy that takes place on the internet or through some sort of computer network / device. The global cost of cyber crime will reach $2 trillion by It currently costs the United States $100 billion annually. The current average cost of a single data breach sits at $4 million, and is only expected to rise over the next few years. From 2005 to 2016, there have been 6,284 reported data breaches – compiling more than 860 million compromised records.
5
Cyber Crime: Popular Tactics
Cyber criminals often implant malware on an unsuspecting victim’s computer. This is often done surreptitiously by way of , spam link, or information submitted to a fraudulent webpage. Identity theft has become one of the most common crimes among cyber criminals million people fell victim back in 2014, and 86% of which were linked to credit card / banking fraud. This is often the result of consumers shopping or submitting information on unprotected websites. Data breaches can affect businesses and organizations of any size. 95% of breaches begin with a phishing attack via standard . Traditional antivirus solutions and spam filters cannot guarantee to stop all pieces of spam from slipping through.
6
Cyber Crime: How Does It Affect Me?
It’s been estimated that 59% of employees steal proprietary corporate data after they’ve been fired or after they have resigned. 43% of all companies have experienced a data breach in the past year. phishing and malware can affect employers & employees on a daily basis. Once infected, the hacker may gain access to account records, contact information, and may even be allowed temporary user access. Business compromise is a relatively newer scam that directly affects C- level positions; the number of these scams have grown rapidly – an increase of 270% since 2015.
7
Secure “For , the old postcard rule applies. Nobody else is supposed to read your postcards, but you’d be a fool if you wrote anything private on one.” Judith Martin
8
Secure Email: The Basics
This year, there have been more than 215 billion s sent/received per day, worldwide. Of this, an estimated 116 billion s are business-related. As mentioned earlier, a common platform that hackers take advantage of is standard , which means that it’s more important than ever to secure your sensitive messages. Secure looks and feels just like your standard platform. The primary difference is that all messages both sent & received never leave the secure server. When a first-time recipient of a secure receives their message, they’ll be taken to the secure portal where an account will be assigned to them. After creating a password, they’ll have access to reply & receive any future secure s.
9
Secure Email: How Can It Help Me?
Using a secure solution is one step that you can take to help better protect your own private information and that of your business. A majority of secure solution are cloud-based, which means that you won’t have to install or manage any associated hardware to use the solution. Secure solutions can help your business meet any compliance requirements that you need to follow, such as HIPAA / GLBA / FINRA / and SOX. Most secure solutions use strong nonrepudiation verification, which can be used, if necessary, in a court of law. This allows you to see exactly when the message, and any attachments, was opened, and by what individual.
10
Resources: Security Intelligence: Juniper Research: IBM (Ponemon Institute): Hemidal Security: FBI: ID Theft Resource Center: Huffington Post: USA Today (Ponemon Institute): Radicati: The Simple Dollar:
11
Thanks for taking part in our presentation!
For more information about us, visit NeoCertified.com or call us at (877)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.