2. Thank you.
How many Facebook accounts are
compromised by hackers every day?
A) 100,000
B) 400,000
C) 600,000
D) 800,000
3. Thank you.
How many Facebook accounts are
compromised by hackers every day?
A) 100,000
B) 400,000
C) 600,000
D) 800,000
Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
4. Web application attacks are the #1 source of
data breaches, up 500% since 2014
Did you know?
Source: 2016 Data Breach Investigations Report, Verizon, 2016
5. Thank you.
How many users accounts were affected in
the September 2016 Yahoo breach?
A) 100 million
B) 500 million
C) 750 million
D) 1 billion
6. Thank you.
How many users accounts were affected in
the September 2016 Yahoo breach?
A) 100 million
B) 500 million
C) 750 million
D) 1 billion
Source: Perlroth, Nicole (September 22, 2016). "Yahoo Says Hackers Stole Data on 500 Million Users in 2014". The New
York Times. Retrieved September 22, 2016.
7. 43% of developers have released apps with
known vulnerabilities at least 80% of the time
Did you know?
Source: The Impact of Security on Development: 2015 Survey Report, Prevoty, 2015
8. 49% of IT security professionals said visibility
to infrastructure security is a big headache
Did you know?
Source: 2016 Cloud Security Spotlight Report, Information Security Linkedin Group Partner, 2016
9. Thank you.
MyDoom, the fastest-spreading email worm ever, is
considered the most expensive virus in cyber security
history. How much financial damage did it cause?
A) $22.5 million
B) $480 million
C) $18 billion
D) $38.5 billion
10. Thank you.
MyDoom, the fastest-spreading email worm ever, is
considered the most expensive virus in cyber security
history. How much financial damage did it cause?
A) $22.5 million
B) $480 million
C) $18 billion
D) $38.5 billion
Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
11. Among organizations that experienced security
incidents, 41% of IT security professionals say
the biggest impact comes from disrupted
business activities
Did you know?
Source: 2017 Cybersecurity Trends Report, Information Security Linkedin Group Partner, 2017
12. Thank you.
How many employees steal
proprietary corporate data when they
quit or are fired?
A) 23%
B) 34%
C) 51%
D) 59%
13. Thank you.
How many employees steal
proprietary corporate data when they
quit or are fired?
A) 23%
B) 34%
C) 51%
D) 59%
Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
14. Less than 5% of data center security budgets
are spent on application security
Did you know?
Source: 2016 Data Breach Investigations Report, Verizon, 2016
15. More than 70% of application developers
admitted that business pressures to release
application updates quickly, often override
security concerns
Did you know?
Source: The Impact of Security on Development: 2015 Survey Report, Prevoty, 2015
16. Thank you.
What is the average annualized cost of
crime incurred by US organizations?
A) $12.7 million
B) $28.5 million
C) $32.3 million
D) $98 million
17. Thank you.
What is the average annualized cost of
crime incurred by US organizations?
A) $12.7 million
B) $28.5 million
C) $32.3 million
D) $98 million
Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
18. 59% of IT security professionals said
traditional tools work somewhat or not at all
Did you know?
Source: 2016 Cloud Security Spotlight Report, Information Security Linkedin Group Partner, 2016
19. Thank you.
What percentage of funds lost as a result
of cyber attacks are non-recoverable?
A) 23%
B) 48%
C) 68%
D) 72%
20. Thank you.
What percentage of funds lost as a result
of cyber attacks are non-recoverable?
A) 23%
B) 48%
C) 68%
D) 72%
Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
21. 72% of web apps have at least one
encapsulation flaw
Did you know?
Source: HPE Security Research: Cyber Risk Report 2016, Hewlett Packard Enterprise, 201614.
22. 41% of IT security professionals said reduced
effort around patches and upgrades of
software is a dominant driver for cloud-based
security solutions
Did you know?
Source: 2016 Cloud Security Spotlight Report, Information Security Linkedin Group Partner, 2016
23. Thank you.
How many cyber attack attempts does
the Pentagon report getting a day?
A) 1 million
B) 5 million
C) 8 million
D) 10 million
24. Thank you.
How many cyber attack attempts does
the Pentagon report getting a day?
A) 1 million
B) 5 million
C) 8 million
D) 10 million
Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
25. 84% of IT security professionals are
dissatisfied with traditional security tools when
applied to cloud infrastructure
Did you know?
Source: ”Cloud Security” 2016 Spotlight Report
26. Thank you.
What is the average time to detect a
malicious or criminal attack?
A) 170 seconds
B) 170 minutes
C) 170 days
D) 17 months
27. Thank you.
What is the average time to detect a
malicious or criminal attack?
A) 170 seconds
B) 170 minutes
C) 170 days
D) 17 months
Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016
28. Critical and high-risk vulnerabilities have an
average age of 300 and 500 days, respectively
Did you know?
Source: Web Applications Statistics Report. WhiteHat, 2016
29. 50% of IT security professionals said
customer-facing web applications present the
highest security risk to the business
Did you know?
Source: 2017 Cybersecurity Trends Report, Information Security Linkedin Group Partner, 2017
31. Thank you.
What percentage of computers are
vulnerable to exploit kits?
A) 53%
B) 62%
C) 87%
D) 99%
Source: “10 Alarming Cyber Security Facts that Threaten Your Data,” heimdalsecurity.com, May 12, 2016