SlideShare uma empresa Scribd logo
1 de 17
Achilles Heel of Email
Think Stock
www.cloudnician.com
by
James O. Grundvig
EVOLUTION OF
EMAIL
2
Route 80 Project
North Jersey
NJ-DOT HQ
Trenton, NJ
12 kb file
(Cover Sheet)
1 9 9 2
Email Replaces Fax One Page at a Time
email
20 Minutes – 60 Miles
Think Stock Think Stock
3
 10 million email accounts
 16 million Internet users
 25,000 websites
 Dial-up Internet Service
THE BIG BANG
INTERNET
1 9 9 5
Netscape’s Web Browser Opens the Internet
Think Stock
4
TIMELINE
TSUNAMI OF
SPAM EMAIL
SPAM
E
V
E
N
T
2004 2009 2013
Spam
costs
firms
$130
billion
5
Spammers
arrested
DropBox
Users
complain
of Spam
1995
10m
email
3.6 B
email
Think Stock
5
SOCIAL ENGINEERING
OF EMAIL
2 0 1 2
Hackers Exploit People
 Your friends can be used
against you
Think Stock
 People are the weak link
 Data Trolls your online life
 29% of cyber attacks are
conducted via email
DE-EVOLUTION OF
EMAIL
email
6
Think Stock Think Stock Think Stock
BRIGHT IDEA
OF EMAIL…
1 to Many
Communication
Send Attached Files
Become more
productive but. . .
email
7Think Stock
8
15 hrs
week
$28,000/yr
Lost time
 918 million corporate email
accounts
 105 emails sent per user
INEFFICIENCY
OF EMAIL
 300 million emails sent each
day are “poison darts”
 37% users don’t reply to email
 Email wasn’t designed to be
collaborative
9
DATA BREACH COSTS
TELECOM GIANT
“High-tech spies managed to infiltrate Telenor’s extensive security
network and empty the contents of the top executives’ personal
computers.” – Afterposten 3-17-13.
Telenor
$18B
31K
20
monitor
traffic
1open
zip file
Rev.
Employ.
10
MORE DATA BREACHES
BY EMAIL
2012
Attacks
- 68.2% done by hackers
- 267 million records exposed
- 1 email exposed S. Carolina’s
3.8 million tax returns
- Evernote didn’t follow own
training: employee opened
“reset” password email (4-19-13)
email
11Think Stock
HEALTHCARE
EXPOSURE TO EMAIL H
12
BOSTON MARATHON
BOMBING
Wounded Suspect brought to
Beth Israel Deaconess MC…
Halls
Empty
Police
Lockdown
Hospital
What if a Terrorist launched a
Cyber Attack on the IT Systems?
H
Think Stock
13
Patient Privacy
& Data Security H
 $2.4 million (2-year) avg.
cost to organization in PHI
 45% claim >5 breaches (up
from 29% in 2010)
 2,769 stolen records/breach
 75% don’t secure medical
devices contain patient data
 94% have leaked data
14
WHICH PATIENT DATA
BREACH IS WORSE? H
 Class-Action lawsuit Glen Falls Hospital NY
 Class-Action lawsuit 22 Florida Hospitals
 Wyoming Doctor’s personal email exposes
2,900 patient records
 Oregon H&SU hacked twice in same year
 2 Breaches, 2 States, 2 Hospitals, Same Day
– Utah & Mississippi
15
CAN WE SECURE DATA?
email
ePhish training
won’t work
Think Stock
16
SEPARATION OF
EMAIL & STATE
EMAIL
SERVER
Off-Premise
Cloud
Corporate IT Network
(on-premise)
External
Communication
FIREWALL
Few Employees
have email
Is this the New Paradigm?
17
NEW CHALLENGE
OF BYOD
Off-Premise
Cloud
DB1
DB3
DB2
- Remote locations
- Multiple devices
- How do we Secure?
Think Stock

Mais conteúdo relacionado

Destaque

Final Project - ITC5330
Final Project - ITC5330Final Project - ITC5330
Final Project - ITC5330driscolljl
 
Kisah katak (Konsep kendiri)
Kisah katak (Konsep kendiri)Kisah katak (Konsep kendiri)
Kisah katak (Konsep kendiri)Siti Nor Fatimah
 
Tiger Capabilities
Tiger CapabilitiesTiger Capabilities
Tiger CapabilitiesAndre Hollis
 
crusades-elorm, julia, emley, collin
crusades-elorm, julia, emley, collincrusades-elorm, julia, emley, collin
crusades-elorm, julia, emley, collinjuliastolfus
 
PINsafe by SWIVEL
PINsafe by SWIVELPINsafe by SWIVEL
PINsafe by SWIVELajldr
 
Duncan enterprises is a regional reseller of epaymentamerica
Duncan enterprises is a regional reseller of epaymentamericaDuncan enterprises is a regional reseller of epaymentamerica
Duncan enterprises is a regional reseller of epaymentamericaDuncanEnterprises
 
Diferencias entre enrutamiento estático y dinámico
Diferencias entre enrutamiento estático y dinámicoDiferencias entre enrutamiento estático y dinámico
Diferencias entre enrutamiento estático y dinámicoEduardo Lange
 

Destaque (13)

Final Project - ITC5330
Final Project - ITC5330Final Project - ITC5330
Final Project - ITC5330
 
25 de mayo
25 de mayo25 de mayo
25 de mayo
 
Kisah katak (Konsep kendiri)
Kisah katak (Konsep kendiri)Kisah katak (Konsep kendiri)
Kisah katak (Konsep kendiri)
 
Part 1
Part 1Part 1
Part 1
 
Conocimiento
ConocimientoConocimiento
Conocimiento
 
Tiger Capabilities
Tiger CapabilitiesTiger Capabilities
Tiger Capabilities
 
crusades-elorm, julia, emley, collin
crusades-elorm, julia, emley, collincrusades-elorm, julia, emley, collin
crusades-elorm, julia, emley, collin
 
Part 1
Part 1Part 1
Part 1
 
Fisiopatología del dolor gus
Fisiopatología del dolor  gusFisiopatología del dolor  gus
Fisiopatología del dolor gus
 
PINsafe by SWIVEL
PINsafe by SWIVELPINsafe by SWIVEL
PINsafe by SWIVEL
 
Duncan enterprises is a regional reseller of epaymentamerica
Duncan enterprises is a regional reseller of epaymentamericaDuncan enterprises is a regional reseller of epaymentamerica
Duncan enterprises is a regional reseller of epaymentamerica
 
Bus inovation for the future
Bus inovation for the futureBus inovation for the future
Bus inovation for the future
 
Diferencias entre enrutamiento estático y dinámico
Diferencias entre enrutamiento estático y dinámicoDiferencias entre enrutamiento estático y dinámico
Diferencias entre enrutamiento estático y dinámico
 

Semelhante a Email IT Security Breaches

Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decadestudentinternetdeals33
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...FecomercioSP
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistanFahad Abbasi
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risksrothl
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risksrothl
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)Neeraj Mahajan
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxsmile790243
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceDulanja Liyanage
 
eCrime Conference March 2006
eCrime Conference March 2006eCrime Conference March 2006
eCrime Conference March 2006Alan Mather
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022ndcmanagement
 
Report on hacking crime and workable solution
Report on hacking crime and workable solutionReport on hacking crime and workable solution
Report on hacking crime and workable solutionShohag Prodhan
 

Semelhante a Email IT Security Breaches (20)

Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
 
eCrime Conference March 2006
eCrime Conference March 2006eCrime Conference March 2006
eCrime Conference March 2006
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
Report on hacking crime and workable solution
Report on hacking crime and workable solutionReport on hacking crime and workable solution
Report on hacking crime and workable solution
 

Último

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

Email IT Security Breaches

  • 1. Achilles Heel of Email Think Stock www.cloudnician.com by James O. Grundvig
  • 2. EVOLUTION OF EMAIL 2 Route 80 Project North Jersey NJ-DOT HQ Trenton, NJ 12 kb file (Cover Sheet) 1 9 9 2 Email Replaces Fax One Page at a Time email 20 Minutes – 60 Miles Think Stock Think Stock
  • 3. 3  10 million email accounts  16 million Internet users  25,000 websites  Dial-up Internet Service THE BIG BANG INTERNET 1 9 9 5 Netscape’s Web Browser Opens the Internet Think Stock
  • 4. 4 TIMELINE TSUNAMI OF SPAM EMAIL SPAM E V E N T 2004 2009 2013 Spam costs firms $130 billion 5 Spammers arrested DropBox Users complain of Spam 1995 10m email 3.6 B email Think Stock
  • 5. 5 SOCIAL ENGINEERING OF EMAIL 2 0 1 2 Hackers Exploit People  Your friends can be used against you Think Stock  People are the weak link  Data Trolls your online life  29% of cyber attacks are conducted via email
  • 7. BRIGHT IDEA OF EMAIL… 1 to Many Communication Send Attached Files Become more productive but. . . email 7Think Stock
  • 8. 8 15 hrs week $28,000/yr Lost time  918 million corporate email accounts  105 emails sent per user INEFFICIENCY OF EMAIL  300 million emails sent each day are “poison darts”  37% users don’t reply to email  Email wasn’t designed to be collaborative
  • 9. 9 DATA BREACH COSTS TELECOM GIANT “High-tech spies managed to infiltrate Telenor’s extensive security network and empty the contents of the top executives’ personal computers.” – Afterposten 3-17-13. Telenor $18B 31K 20 monitor traffic 1open zip file Rev. Employ.
  • 10. 10 MORE DATA BREACHES BY EMAIL 2012 Attacks - 68.2% done by hackers - 267 million records exposed - 1 email exposed S. Carolina’s 3.8 million tax returns - Evernote didn’t follow own training: employee opened “reset” password email (4-19-13) email
  • 12. 12 BOSTON MARATHON BOMBING Wounded Suspect brought to Beth Israel Deaconess MC… Halls Empty Police Lockdown Hospital What if a Terrorist launched a Cyber Attack on the IT Systems? H Think Stock
  • 13. 13 Patient Privacy & Data Security H  $2.4 million (2-year) avg. cost to organization in PHI  45% claim >5 breaches (up from 29% in 2010)  2,769 stolen records/breach  75% don’t secure medical devices contain patient data  94% have leaked data
  • 14. 14 WHICH PATIENT DATA BREACH IS WORSE? H  Class-Action lawsuit Glen Falls Hospital NY  Class-Action lawsuit 22 Florida Hospitals  Wyoming Doctor’s personal email exposes 2,900 patient records  Oregon H&SU hacked twice in same year  2 Breaches, 2 States, 2 Hospitals, Same Day – Utah & Mississippi
  • 15. 15 CAN WE SECURE DATA? email ePhish training won’t work Think Stock
  • 16. 16 SEPARATION OF EMAIL & STATE EMAIL SERVER Off-Premise Cloud Corporate IT Network (on-premise) External Communication FIREWALL Few Employees have email Is this the New Paradigm?
  • 17. 17 NEW CHALLENGE OF BYOD Off-Premise Cloud DB1 DB3 DB2 - Remote locations - Multiple devices - How do we Secure? Think Stock

Notas do Editor

  1. World’s Fair 1964 to 2013 . . . Half a century, how things have changed.
  2. Sending the cover sheet of a monthly pay requisition.
  3. *Note:Internet World Stats, Net Valley Stats, FactMonster.com
  4. Death by PowerPoint or Death by Email