SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
F e b r u a r y    2 0 1 2




 Shield Your Business -
 Combat Phishing Attacks
 A White Paper


By Karl Kispert, Information Risk Management, Vice President at Aujas




EC-Council                                                              www.eccouncil.org/ciso
1




        Shield Your Business -
        Combat Phishing Attacks

        The  alarming  increase  in  cybercrime  rates  and  security  breaches  in  recent  years  stresses  the  




                                                                                                                  -­‐


                                                                                                                  -­‐
                                                                                                                  -­‐




                                                                                                                -­‐




Copyright  ©  EC-­‐Council,  2012.  All  Rights  Reserved                                         www.eccouncil.org/ciso
2




                                      Website  Categories  Infected  With  Phishing

                                                            Source: CommTouch Reports


                                                   Rank

                                                     1
                                                     2

                                                     3

                                                     4

                                                     5
                                                     6

                                                     7

                                                     8
                                                     9
                                                    10




                                                                                                     -­‐
                                                                                                     -­‐




Copyright  ©  EC-­‐Council,  2012.  All  Rights  Reserved                               www.eccouncil.org/ciso
3




                                                                         -­‐
                                                                         -­‐




Copyright  ©  EC-­‐Council,  2012.  All  Rights  Reserved   www.eccouncil.org/ciso
4




                                                                         -­‐




                                                                         -­‐




Copyright  ©  EC-­‐Council,  2012.  All  Rights  Reserved   www.eccouncil.org/ciso
5




Copyright  ©  EC-­‐Council,  2012.  All  Rights  Reserved   www.eccouncil.org/ciso
6




     About the Author


                                                            Karl Kispert ,




                                                                                            -­‐




Copyright  ©  EC-­‐Council,  2012.  All  Rights  Reserved                    www.eccouncil.org/ciso

Mais conteúdo relacionado

Semelhante a Shield Your Business Combat Phishing Attacks

2.0 Adoption Council Intro
2.0 Adoption Council Intro2.0 Adoption Council Intro
2.0 Adoption Council Intro
SoCo Partners
 
AI Blockchain IoT Convergence for ESG Digital Transformation Webinar
AI Blockchain IoT Convergence for ESG Digital Transformation WebinarAI Blockchain IoT Convergence for ESG Digital Transformation Webinar
AI Blockchain IoT Convergence for ESG Digital Transformation Webinar
Alex G. Lee, Ph.D. Esq. CLP
 
HOTEL PROPOSAL – THE HEART OF EUROPE 5150 HOTEL PROP
HOTEL   PROPOSAL  –  THE HEART OF EUROPE  5150    HOTEL   PROPHOTEL   PROPOSAL  –  THE HEART OF EUROPE  5150    HOTEL   PROP
HOTEL PROPOSAL – THE HEART OF EUROPE 5150 HOTEL PROP
PazSilviapm
 
Flanders clean tech sectro vito_2012 10 31_taipei
Flanders clean tech sectro vito_2012 10 31_taipeiFlanders clean tech sectro vito_2012 10 31_taipei
Flanders clean tech sectro vito_2012 10 31_taipei
Helenachn Chen
 
CIO perspective: Investment decisions and the future for technology for Assoc...
CIO perspective: Investment decisions and the future for technology for Assoc...CIO perspective: Investment decisions and the future for technology for Assoc...
CIO perspective: Investment decisions and the future for technology for Assoc...
Associations Network
 

Semelhante a Shield Your Business Combat Phishing Attacks (18)

2.0 Adoption Council Intro
2.0 Adoption Council Intro2.0 Adoption Council Intro
2.0 Adoption Council Intro
 
AI Blockchain IoT Convergence for ESG Digital Transformation Webinar
AI Blockchain IoT Convergence for ESG Digital Transformation WebinarAI Blockchain IoT Convergence for ESG Digital Transformation Webinar
AI Blockchain IoT Convergence for ESG Digital Transformation Webinar
 
Cobi T Top Down Bottom Up
Cobi T Top Down  Bottom UpCobi T Top Down  Bottom Up
Cobi T Top Down Bottom Up
 
Permissionless Innovation BIM Trichy 2 Feb 2012
Permissionless Innovation BIM Trichy 2 Feb 2012Permissionless Innovation BIM Trichy 2 Feb 2012
Permissionless Innovation BIM Trichy 2 Feb 2012
 
HOTEL PROPOSAL – THE HEART OF EUROPE 5150 HOTEL PROP
HOTEL   PROPOSAL  –  THE HEART OF EUROPE  5150    HOTEL   PROPHOTEL   PROPOSAL  –  THE HEART OF EUROPE  5150    HOTEL   PROP
HOTEL PROPOSAL – THE HEART OF EUROPE 5150 HOTEL PROP
 
3rd annual global mining technology forum v3
3rd annual global mining technology forum v33rd annual global mining technology forum v3
3rd annual global mining technology forum v3
 
Flanders clean tech sectro vito_2012 10 31_taipei
Flanders clean tech sectro vito_2012 10 31_taipeiFlanders clean tech sectro vito_2012 10 31_taipei
Flanders clean tech sectro vito_2012 10 31_taipei
 
Four Rules for Dealing with a Digital Reality
Four Rules for Dealing with a Digital RealityFour Rules for Dealing with a Digital Reality
Four Rules for Dealing with a Digital Reality
 
CIO perspective: Investment decisions and the future for technology for Assoc...
CIO perspective: Investment decisions and the future for technology for Assoc...CIO perspective: Investment decisions and the future for technology for Assoc...
CIO perspective: Investment decisions and the future for technology for Assoc...
 
IBM Case Study CIO Event
IBM Case Study CIO Event IBM Case Study CIO Event
IBM Case Study CIO Event
 
Intervention: Embedded Systems and Advanced Computing
Intervention: Embedded Systems and Advanced ComputingIntervention: Embedded Systems and Advanced Computing
Intervention: Embedded Systems and Advanced Computing
 
LA DUCK CONF 2023 - Parce que nos plateformes le valent bien
LA DUCK CONF 2023 - Parce que nos plateformes le valent bienLA DUCK CONF 2023 - Parce que nos plateformes le valent bien
LA DUCK CONF 2023 - Parce que nos plateformes le valent bien
 
Ow2 Ten Minute Prez
Ow2 Ten Minute PrezOw2 Ten Minute Prez
Ow2 Ten Minute Prez
 
RSA E-Commerce Fraud Trends 2013
RSA E-Commerce Fraud Trends 2013RSA E-Commerce Fraud Trends 2013
RSA E-Commerce Fraud Trends 2013
 
Biotech sector in italy
Biotech sector in italyBiotech sector in italy
Biotech sector in italy
 
Partner facing vspex deck[1]
Partner facing vspex deck[1]Partner facing vspex deck[1]
Partner facing vspex deck[1]
 
EU Masterclass Capgemini Interoperability In Europe
EU Masterclass Capgemini Interoperability In EuropeEU Masterclass Capgemini Interoperability In Europe
EU Masterclass Capgemini Interoperability In Europe
 
Shaping the Things to Come (2012)
Shaping the Things to Come (2012)Shaping the Things to Come (2012)
Shaping the Things to Come (2012)
 

Shield Your Business Combat Phishing Attacks

  • 1. F e b r u a r y   2 0 1 2 Shield Your Business - Combat Phishing Attacks A White Paper By Karl Kispert, Information Risk Management, Vice President at Aujas EC-Council www.eccouncil.org/ciso
  • 2. 1 Shield Your Business - Combat Phishing Attacks The  alarming  increase  in  cybercrime  rates  and  security  breaches  in  recent  years  stresses  the   -­‐ -­‐ -­‐ -­‐ Copyright  ©  EC-­‐Council,  2012.  All  Rights  Reserved www.eccouncil.org/ciso
  • 3. 2 Website  Categories  Infected  With  Phishing Source: CommTouch Reports Rank 1 2 3 4 5 6 7 8 9 10 -­‐ -­‐ Copyright  ©  EC-­‐Council,  2012.  All  Rights  Reserved www.eccouncil.org/ciso
  • 4. 3 -­‐ -­‐ Copyright  ©  EC-­‐Council,  2012.  All  Rights  Reserved www.eccouncil.org/ciso
  • 5. 4 -­‐ -­‐ Copyright  ©  EC-­‐Council,  2012.  All  Rights  Reserved www.eccouncil.org/ciso
  • 6. 5 Copyright  ©  EC-­‐Council,  2012.  All  Rights  Reserved www.eccouncil.org/ciso
  • 7. 6 About the Author Karl Kispert , -­‐ Copyright  ©  EC-­‐Council,  2012.  All  Rights  Reserved www.eccouncil.org/ciso