SlideShare uma empresa Scribd logo
1 de 33
Hemali Rangoliya
01 | What is Data Breach & Data Loss ?
02 | Common Causes of Data Loss
03 | Effects of Data Loss on Businesses
04 | Prevention & Privacy Legislation Worldwide
04 | Mind-Boggling Statistics & Facts
Overview
What is data loss?
Data loss is any process or event that results in data
being corrupted, deleted and/or made unreadable by a
user and/or software or application.
Data loss may involve:
● Payment card information (PCI)
● Personal health information (PHI)
● Personally identifiable information (PII)
● Trade secrets, or intellectual property
What is data breach?
A data breach comes as a result of a cyberattack that
allows cybercriminals to gain unauthorized access to a
computer system or network and steal the private,
sensitive, or confidential personal and financial data of
the customers or users contained within
Phases of a Data Breach :
● Research
● Attack
● Exfiltrate
Common causes of data loss
Data breach is the most common cause that leads to data loss. There are several factors also through which we
can loos public as well as private data.
➔ Hacking
➔ Human Error
➔ Virus & Malware
➔ Social Engineering
➔ Power Failures
➔ Physical Theft
➔ Environment/ Disasters
➔ Misuse
➔ Ransomware
➔ Liquid Damage
➔ Phishing attack
➔ Use Of Vulnerable Third Party Application
➔ Formjacking attacks & Cryptojacking
➔ clickjacking
Statistics by data loss causes
Several factors have been found to be responsible for data
breaches. They include:
$157
Per User
$131
Per User
$128
Per User
There were more than 1.76 billion records leaked in
January 2020 alone.
● 34% of data breaches involved internal
actors. (Verizon)
● Phishing emails are responsible for about
91 % of cyber attacks.
● Mobile malware increasing by a massive
54 % in one year.
● A staggering 92 % of malware is
delivered via email.
● Cryptojacking is one of the more serious
cyber threats to watch out for in 2020.
Deep Dive into 4 Common Causes
Deep dive into common causes of data loss
Ransomware
Ransomware is the name for malicious software which gains
access and locks down access to vital data (i.e., files,
systems).The WannaCry ransomware attack made many
people cry in 2017
● The average cost of a ransomware attack on businesses is
$133,000. (SafeAtLast)
● WannaCry ransomware attack cost the National Health
Service (NHS) over $100 million. (Datto)
● 39% of the global data breaches caused by ransomware
5,4 billion WannaCry attacks
were blocked in 2017“
“
Imperva in their 2019 Cyberthreat Defense Report.
Phishing
Phishing occurs when someone or something mimics a
trusted, reputable entity in order to collect sensitive data
(often banking or highly personal details). These attacks
are not exclusive to the Internet. Common methods for
phishing scams can include:
● A pop-up on your browser
● An email with a link
● A person on the phone claiming to be a
representative of a reputable company
Tuesday has been observed as the most popular day for
phishers to conduct their campaigns while the least
popular day was Friday.
Denial-of-Service (DoS)
DoS breach essentially takes away access to
websites and webpages. When this happens at large
scale, it’s known as a distributed denial-of-service
(DDoS)
● The cost of a DDoS attack averages between
$20,000-$40,000 per hour.
● The average size of DDoS attacks was at the
mindblowing 26.37 GBps in Q2 2018.
● The longest attack in 2018 lasted 329 hours nearly 2
weeks
● The majority of DDoS attacks are launched from(over 4.5
million in 2018)
Source: Neustar
Effects of data loss on businesses
There was significant variation in total data breach costs by
organization size.
● 94 % of companies that experience severe data loss do not
recover
● 51 % of these companies close within two years of the data loss
● 43% of breach victims were small businesses. (Verizon)
● 15% of breaches involved Healthcare organizations
● 10% in the Financial industry
● 16% in the Public Sector.
The cost of data breach in
the healthcare industry was
the highest at $6.5 MILLION
-IBM
Telstra Security Report 2018
Data Loss Prevention &
Privacy Legislation Worldwide
What is data loss prevention
Data loss prevention (DLP) technology aims to identify,
monitor and protect your data, both in storage or in motion
through network, from misuse/theft/ransomware/leakage.
How to prevent your data?
● Backup
● Use of anti-virus software
● Complying network policies like principle of least privilege (POLP)
● Adhering to data protection Certification such as PCI DSS, HIPPA, Cloud Security Alliance, FEDRAMP,
HITRUST, ISO 27001/2/17/18, SOC ⅔, Privacy Shield Framework, US-EU Safe Harbor Privacy Framework
Privacy Legislation Worldwide
● US includes California Consumer Privacy Act (CCPA)
● Brazil’s Lei Geral de Proteção de Dados (LGPD)
● Thailand’s Personal Data Protection Act (PDPA).
● European Union’s General Data Protection Regulation (GDPR)
● Switzerland's Federal Act
● India’s The Information Technology Act
● South Africa's Electronic Communications and Transactions Act
● New Zealand's Privacy Act of 1993
As 2018 was the year
of the GDPR, 2020
will be the year of the
CCPA. Its
enforcement is likely
to set an example for
other US states and
may serve as a
secondary blueprint
for international data
protection legislation
looking for an
alternative to the
strict model of the
GDPR.
“
“
Privacy Legislation Worldwide
58%
COUNTRIES WITH
Legislation
10%
COUNTRIES WITH
Draft Legislation
21%
COUNTRIES WITH
No Legislation
12%
COUNTRIES WITH
No Data
United Nations Conference on Trade and Development 14/01/2010
Mind-Boggling Statistics & Facts
80 % of the problems can be solved by getting
the cyber hygiene correct , rather than chasing
the latest advanced technology.
“
“
Conclusion
80%

Mais conteúdo relacionado

Mais procurados

Security Compliance and Management - Issues Faced by Organisations Today.
Security Compliance and Management - Issues Faced by Organisations Today.Security Compliance and Management - Issues Faced by Organisations Today.
Security Compliance and Management - Issues Faced by Organisations Today.
Gilbert Verdian
 

Mais procurados (20)

Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
CBIZ Cyber Security - What Every Business Needs to Know
CBIZ Cyber Security - What Every Business Needs to KnowCBIZ Cyber Security - What Every Business Needs to Know
CBIZ Cyber Security - What Every Business Needs to Know
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
Cyber Threats and Insurance
Cyber Threats and InsuranceCyber Threats and Insurance
Cyber Threats and Insurance
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Why Data Security is Important
Why Data Security is ImportantWhy Data Security is Important
Why Data Security is Important
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
SLVA - Privacy Framework and Approach
SLVA - Privacy Framework and ApproachSLVA - Privacy Framework and Approach
SLVA - Privacy Framework and Approach
 
Security Compliance and Management - Issues Faced by Organisations Today.
Security Compliance and Management - Issues Faced by Organisations Today.Security Compliance and Management - Issues Faced by Organisations Today.
Security Compliance and Management - Issues Faced by Organisations Today.
 
Business Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer SystemsBusiness Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer Systems
 
Cyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data BreachesCyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data Breaches
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
 

Semelhante a DATA BREACH & PREVENTION - Hemali Rangoliya

wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
Numaan Huq
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
mharbpavia
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
IJERD Editor
 

Semelhante a DATA BREACH & PREVENTION - Hemali Rangoliya (20)

What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Safeguarding Data Integrity: A Comprehensive Review of Cyber Data Breaches wi...
Safeguarding Data Integrity: A Comprehensive Review of Cyber Data Breaches wi...Safeguarding Data Integrity: A Comprehensive Review of Cyber Data Breaches wi...
Safeguarding Data Integrity: A Comprehensive Review of Cyber Data Breaches wi...
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 

Mais de NSConclave

Mais de NSConclave (20)

RED-TEAM_Conclave
RED-TEAM_ConclaveRED-TEAM_Conclave
RED-TEAM_Conclave
 
Create a Custom Plugin in Burp Suite using the Extension
Create a Custom Plugin in Burp Suite using the ExtensionCreate a Custom Plugin in Burp Suite using the Extension
Create a Custom Plugin in Burp Suite using the Extension
 
IOT SECURITY ASSESSMENT Pentester's Approach
IOT SECURITY ASSESSMENT Pentester's ApproachIOT SECURITY ASSESSMENT Pentester's Approach
IOT SECURITY ASSESSMENT Pentester's Approach
 
Debugging Android Native Library
Debugging Android Native LibraryDebugging Android Native Library
Debugging Android Native Library
 
Burp Suite Extension Development
Burp Suite Extension DevelopmentBurp Suite Extension Development
Burp Suite Extension Development
 
Log Analysis
Log AnalysisLog Analysis
Log Analysis
 
Regular Expression Injection
Regular Expression InjectionRegular Expression Injection
Regular Expression Injection
 
HTML5 Messaging (Post Message)
HTML5 Messaging (Post Message)HTML5 Messaging (Post Message)
HTML5 Messaging (Post Message)
 
Node.js Deserialization
Node.js DeserializationNode.js Deserialization
Node.js Deserialization
 
RIA Cross Domain Policy
RIA Cross Domain PolicyRIA Cross Domain Policy
RIA Cross Domain Policy
 
LDAP Injection
LDAP InjectionLDAP Injection
LDAP Injection
 
Python Deserialization Attacks
Python Deserialization AttacksPython Deserialization Attacks
Python Deserialization Attacks
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
NoSql Injection
NoSql InjectionNoSql Injection
NoSql Injection
 
Thick Client Testing Advanced
Thick Client Testing AdvancedThick Client Testing Advanced
Thick Client Testing Advanced
 
Thick Client Testing Basics
Thick Client Testing BasicsThick Client Testing Basics
Thick Client Testing Basics
 
Markdown
MarkdownMarkdown
Markdown
 
Docker 101
Docker 101Docker 101
Docker 101
 
Security Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren ShahSecurity Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren Shah
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

DATA BREACH & PREVENTION - Hemali Rangoliya

  • 2.
  • 3. 01 | What is Data Breach & Data Loss ? 02 | Common Causes of Data Loss 03 | Effects of Data Loss on Businesses 04 | Prevention & Privacy Legislation Worldwide 04 | Mind-Boggling Statistics & Facts Overview
  • 4. What is data loss? Data loss is any process or event that results in data being corrupted, deleted and/or made unreadable by a user and/or software or application. Data loss may involve: ● Payment card information (PCI) ● Personal health information (PHI) ● Personally identifiable information (PII) ● Trade secrets, or intellectual property
  • 5. What is data breach? A data breach comes as a result of a cyberattack that allows cybercriminals to gain unauthorized access to a computer system or network and steal the private, sensitive, or confidential personal and financial data of the customers or users contained within Phases of a Data Breach : ● Research ● Attack ● Exfiltrate
  • 6.
  • 7. Common causes of data loss Data breach is the most common cause that leads to data loss. There are several factors also through which we can loos public as well as private data. ➔ Hacking ➔ Human Error ➔ Virus & Malware ➔ Social Engineering ➔ Power Failures ➔ Physical Theft ➔ Environment/ Disasters ➔ Misuse ➔ Ransomware ➔ Liquid Damage ➔ Phishing attack ➔ Use Of Vulnerable Third Party Application ➔ Formjacking attacks & Cryptojacking ➔ clickjacking
  • 8. Statistics by data loss causes Several factors have been found to be responsible for data breaches. They include: $157 Per User $131 Per User $128 Per User There were more than 1.76 billion records leaked in January 2020 alone. ● 34% of data breaches involved internal actors. (Verizon) ● Phishing emails are responsible for about 91 % of cyber attacks. ● Mobile malware increasing by a massive 54 % in one year. ● A staggering 92 % of malware is delivered via email. ● Cryptojacking is one of the more serious cyber threats to watch out for in 2020.
  • 9. Deep Dive into 4 Common Causes Deep dive into common causes of data loss
  • 10. Ransomware Ransomware is the name for malicious software which gains access and locks down access to vital data (i.e., files, systems).The WannaCry ransomware attack made many people cry in 2017 ● The average cost of a ransomware attack on businesses is $133,000. (SafeAtLast) ● WannaCry ransomware attack cost the National Health Service (NHS) over $100 million. (Datto) ● 39% of the global data breaches caused by ransomware 5,4 billion WannaCry attacks were blocked in 2017“ “
  • 11. Imperva in their 2019 Cyberthreat Defense Report.
  • 12. Phishing Phishing occurs when someone or something mimics a trusted, reputable entity in order to collect sensitive data (often banking or highly personal details). These attacks are not exclusive to the Internet. Common methods for phishing scams can include: ● A pop-up on your browser ● An email with a link ● A person on the phone claiming to be a representative of a reputable company Tuesday has been observed as the most popular day for phishers to conduct their campaigns while the least popular day was Friday.
  • 13.
  • 14. Denial-of-Service (DoS) DoS breach essentially takes away access to websites and webpages. When this happens at large scale, it’s known as a distributed denial-of-service (DDoS) ● The cost of a DDoS attack averages between $20,000-$40,000 per hour. ● The average size of DDoS attacks was at the mindblowing 26.37 GBps in Q2 2018. ● The longest attack in 2018 lasted 329 hours nearly 2 weeks ● The majority of DDoS attacks are launched from(over 4.5 million in 2018)
  • 15.
  • 17. Effects of data loss on businesses There was significant variation in total data breach costs by organization size. ● 94 % of companies that experience severe data loss do not recover ● 51 % of these companies close within two years of the data loss ● 43% of breach victims were small businesses. (Verizon) ● 15% of breaches involved Healthcare organizations ● 10% in the Financial industry ● 16% in the Public Sector. The cost of data breach in the healthcare industry was the highest at $6.5 MILLION -IBM
  • 19.
  • 20. Data Loss Prevention & Privacy Legislation Worldwide
  • 21. What is data loss prevention Data loss prevention (DLP) technology aims to identify, monitor and protect your data, both in storage or in motion through network, from misuse/theft/ransomware/leakage. How to prevent your data? ● Backup ● Use of anti-virus software ● Complying network policies like principle of least privilege (POLP) ● Adhering to data protection Certification such as PCI DSS, HIPPA, Cloud Security Alliance, FEDRAMP, HITRUST, ISO 27001/2/17/18, SOC ⅔, Privacy Shield Framework, US-EU Safe Harbor Privacy Framework
  • 22. Privacy Legislation Worldwide ● US includes California Consumer Privacy Act (CCPA) ● Brazil’s Lei Geral de Proteção de Dados (LGPD) ● Thailand’s Personal Data Protection Act (PDPA). ● European Union’s General Data Protection Regulation (GDPR) ● Switzerland's Federal Act ● India’s The Information Technology Act ● South Africa's Electronic Communications and Transactions Act ● New Zealand's Privacy Act of 1993 As 2018 was the year of the GDPR, 2020 will be the year of the CCPA. Its enforcement is likely to set an example for other US states and may serve as a secondary blueprint for international data protection legislation looking for an alternative to the strict model of the GDPR. “ “
  • 23. Privacy Legislation Worldwide 58% COUNTRIES WITH Legislation 10% COUNTRIES WITH Draft Legislation 21% COUNTRIES WITH No Legislation 12% COUNTRIES WITH No Data United Nations Conference on Trade and Development 14/01/2010
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. 80 % of the problems can be solved by getting the cyber hygiene correct , rather than chasing the latest advanced technology. “ “ Conclusion 80%