Download presentation
Presentation is loading. Please wait.
Published byPauliina Mäkinen Modified over 6 years ago
1
Cyber security and email
Today’s Risk. Today’s Solutions. Cyber security and Presented by Gerald Montella, President & CEO Trustifi Corporation
2
Contents of Presentation
Introduction to Cyber Security Issues Background Information of Cyber Crimes Preventative Measures Market Opportunities for Remediation Contents of Presentation 2
3
A Brief History of Cyber Security Issues
The First Computer Worm — Late 1980s - Early 1990s Succeeded in shutting down the Internet The First Viruses — 1990s Caused global failure Credit Cards Under Attack — Late 2000s Cyber attacks become more targeted with the first serial data breach of credit card numbers. The Threat Tsunami — Modern Day Cyber breaches are now board-level issues. Data breaches cost an average $6.53 million per incident.
4
3 No Plug-Ins or Downloads required Authentication & Verification
Tamper-Proof PDF Option 3
5
Data Breaches — By the Numbers
Since ,508,931 records have been compromised as the result of data breaches.
7
The number of accounts worldwide is expected to increase by 6% — from over 3.9 billion in 2013 to over 4.9 billion by the end of 2017. The go-to form of communication in the business world is . Business is expected to grow at an average annual growth rate of about 5% — from over 929 million boxes in 2013 to over 1.1 billion by the end of 2017. The majority of business accounts are currently deployed on-premises. In 2013, the majority of traffic came from business , which accounted for over 100 billion s sent and received per day. This trend is expected to continue and will account for over 132 billion s sent and received per day by the end of 2017. Consumer accounts currently account for the vast majority — approximately 76% — of worldwide accounts. The market share is expected to steadily increase as more people come online and continues to be a key component of the online experience.
8
The Radicati Group, Inc.
9
The Radicati Group, Inc.
10
Email is often the entry point for all manner of malware attacks.
There are at least three hops every goes through on its way to a recipient. Each of these points may or may not be encrypted. Unencrypted and its attachment pose a threat to your data security and privacy, and are vulnerable to attack from hackers and other cyber threats. When an attachment is encrypted it’s often done with subpar techniques like using a locked spreadsheet with a simple password (e.g. abc123) that is easily penetrable.
11
What Can We Do About Cyberthreats? Preventative Measures
Start with security Factor it into the decision making in every department of your business – personnel, sales, accounting, information technology, etc Control access to data sensibly Put controls in place to make sure employees have access only on a “need to know” basis. For your network, consider steps such as separate user accounts to limit access to the places where personal data is stored or to control who can use particular databases. Require secure passwords & authentication If you have personal information stored on your network, strong authentication – including sensible password “hygiene” – can help ensure that only authorized individuals can access the data. Segment your network & monitor who’s trying to get in and out When designing your network, consider using tools like firewalls to segment your network, thereby limiting access between computers on your network and between your computers and the internet. Another useful safeguard: intrusion detection and prevention tools to monitor your network for malicious activity.
12
Market Opportunities for Remediation
Invest in network security. Send secure s to authenticated recipients. Train your employees to prevent social engineering. Secure the devices used by your company.
13
Know who’s looking at your email and what they’re doing with it.
14
Questions
15
Thank You!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.