SlideShare a Scribd company logo
1 of 1
Download to read offline
JOY TO THE WORLD
Next-Gen Vulnerability Management
Secures Holiday Shopping
Top Retail Sales Days1

Cyber-criminals don’t
take the Holidays off!

Thefts of payment card data and other Personally Identifiable Information
(PII) will result in big losses for consumers and merchants.2

est.

xxx-xx-xxxx

Holiday Shopping Activity Black Friday Weekend:
During peak holiday shopping season, InfoSec teams at merchants, banks and service providers
are in production-freeze. What matters most is maintaining the flow of commerce.3

2011

2012

2013

247

226

Shoppers in Millions

$61.4 est.

$59.1

$52.4

255 est.

Holiday Shopping in Billions

Cyber-crime delivers a lump of coal —
$388 Billion in worldwide costs
4

70%

47,000+

621

of all cybercrime is financially
motivated

reported security incidents

confirmed data disclosures

44 Million+

52%

66%

reported breaches involved
hacking

compromised records

reported breaches took months
to discover

I’m Dreaming of a Mobile Christmas

Consumers will use smartphones for holiday shopping and m-commerce.5

56%

45%

36%

54%

44%

32%

47%

40%

31%

Mobile Safety Tips
Wi-Fi hotspots:

Protect your $$:

Almost 40% don’t take even minimal
security measures:

Naughty Apps!:

Limit the type of business you conduct and
adjust the security settings on your device
to limit who can access your phone.6

When banking and shopping, check to be
sure the site is security enabled. Look for
web addresses with "https://" or "shttp://,"
which means the site secures your
information. "Http://" is not secure.6

Use a screen lock, back up data, and install
an app to locate a missing phone and
remotely erase data from it.7

When in doubt, don't respond:

Fradulent texting, calling and voicemails are
on the rise. Just like email, requests for
personal information or for immediate
action are almost always a scam.6

Beware of legit-looking, but potentially
malicious shopping apps from dubious
sources. Only download apps signed by
reputable retailers.

Holiday-Induced Vulnerability Bloat

8

Happy New Year! Even if they
reach January 2014 with nary
a hack or breach, infosec
teams must catch up on
time-consuming system
updates and patching projects
while preparing for annual
compliance assessments.8

Remotely Exploitable Vulnerabilities
Nov. — Dec. 2012

Jan. 2013

What is Tenable Next-Generation Vulnerability Management?

Tenable SecurityCenter Continuous View is the industry’s only next-generation
vulnerability management platform. It combines scan data, network intelligence and
activity logs collected from Tenable’s industry leading sensors, Nessus, Passive
Vulnerability Scanner and Log Correlation Engine, to deliver the most advanced
analysis of security risks and compliance exposure present in enterprise IT
environments. Learn more: www.tenable.com/next-gen.

Sources

1: Mastercard’s Projected Top Shopping Days for 2013 (released on 11/20/2013)
2: Capgemini World Payments Report 2013 & http://www.nrf.com/modules.php?name=Pages&sp_id=1140
3: About.com, http://useconomy.about.com/od/demand/f/Black_Friday.htm
4: Verizon, 2013 Verizon Data Breach Investigations Report
5:http://www.internetretailer.com/2013/10/24/mobile-devices-will-play-big-role-2013-holiday-shopping
6:http://staysafeonline.org/stay-safe-online/mobile-and-on-the-go/mobile-devices
7: http://consumerreports.org/privacy0613
8: http://web.nvd.nist.gov/view/vuln/statistics
© 2013 Tenable Network Security, Inc.

More Related Content

What's hot

2014 information technology threat predictions
2014 information technology threat predictions2014 information technology threat predictions
2014 information technology threat predictionsPrayukth K V
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPaloAltoNetworks
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five yearsSABBY GILL
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Microsoft
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019SrikanthRaju7
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them SrikanthRaju7
 
Smartphone and mobile device safety & security
Smartphone and mobile device safety & securitySmartphone and mobile device safety & security
Smartphone and mobile device safety & securityAlbanMichael
 
Business inSecurity
Business inSecurityBusiness inSecurity
Business inSecurityEboney Brown
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Cristian Garcia G.
 
Security and Your Business
Security and Your BusinessSecurity and Your Business
Security and Your BusinessAll Covered
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016Shannon G., MBA
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingCigniti Technologies Ltd
 
The Case of the Mistaken Malware
The Case of the Mistaken MalwareThe Case of the Mistaken Malware
The Case of the Mistaken MalwareSecurityMetrics
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...CODE BLUE
 
Quick heal laptop tracker
Quick heal  laptop trackerQuick heal  laptop tracker
Quick heal laptop trackerQuick Heal
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 

What's hot (20)

2014 information technology threat predictions
2014 information technology threat predictions2014 information technology threat predictions
2014 information technology threat predictions
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity Predictions
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
 
Smartphone and mobile device safety & security
Smartphone and mobile device safety & securitySmartphone and mobile device safety & security
Smartphone and mobile device safety & security
 
Business inSecurity
Business inSecurityBusiness inSecurity
Business inSecurity
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
 
Cyber security trends 2018
Cyber security trends 2018Cyber security trends 2018
Cyber security trends 2018
 
Security and Your Business
Security and Your BusinessSecurity and Your Business
Security and Your Business
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 
The Case of the Mistaken Malware
The Case of the Mistaken MalwareThe Case of the Mistaken Malware
The Case of the Mistaken Malware
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Quick heal laptop tracker
Quick heal  laptop trackerQuick heal  laptop tracker
Quick heal laptop tracker
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 

Viewers also liked

Niveles nueva metra
Niveles nueva metraNiveles nueva metra
Niveles nueva metraarar2110
 
Букин Д.Ю. Мультимедийные ресурсы
Букин Д.Ю. Мультимедийные ресурсыБукин Д.Ю. Мультимедийные ресурсы
Букин Д.Ю. Мультимедийные ресурсыlentik
 
Cómo educar en valores
Cómo educar en valoresCómo educar en valores
Cómo educar en valoresAudino Fuentes
 
Logros en recursos e instalaciones
Logros en recursos e instalacionesLogros en recursos e instalaciones
Logros en recursos e instalacionesfranju
 
công ty hiếu ngọc-tay son,binh dinh
công ty hiếu ngọc-tay son,binh dinhcông ty hiếu ngọc-tay son,binh dinh
công ty hiếu ngọc-tay son,binh dinhNguyen Thi Loan
 
Christmas in italy
Christmas in italyChristmas in italy
Christmas in italygiacolone
 
La tecnologia y sus multiples relaciones
La tecnologia y sus multiples relacionesLa tecnologia y sus multiples relaciones
La tecnologia y sus multiples relacionesMateo Paz Quintero
 
Silk'n Glide Depiladora Luz Pulsada
Silk'n Glide Depiladora Luz Pulsada
Silk'n Glide Depiladora Luz Pulsada
Silk'n Glide Depiladora Luz Pulsada joyce3deleon31
 
CAWASA e-Source Newsletter - Issue 5 : January - June 2013
CAWASA e-Source Newsletter - Issue 5 : January - June 2013 CAWASA e-Source Newsletter - Issue 5 : January - June 2013
CAWASA e-Source Newsletter - Issue 5 : January - June 2013 CAWASA
 
petit-papa-noel
 petit-papa-noel petit-papa-noel
petit-papa-noelBalcon60
 
Tolerancias dimensionales 1
Tolerancias dimensionales 1Tolerancias dimensionales 1
Tolerancias dimensionales 1edwin1520
 
Juego tradicional frente al juego digital (grupo 13)
Juego tradicional frente al juego digital (grupo 13)Juego tradicional frente al juego digital (grupo 13)
Juego tradicional frente al juego digital (grupo 13)Maria Jose López
 
Vendemore Pres Event Conductive "Strategic Product Management"
Vendemore Pres Event Conductive "Strategic Product Management"Vendemore Pres Event Conductive "Strategic Product Management"
Vendemore Pres Event Conductive "Strategic Product Management"Vendemore [A Bisnode Company]
 
три A маркетинговых компаний от Digital Boutique
три A маркетинговых компаний от Digital Boutiqueтри A маркетинговых компаний от Digital Boutique
три A маркетинговых компаний от Digital BoutiqueEkaterina Gould
 

Viewers also liked (20)

Niveles nueva metra
Niveles nueva metraNiveles nueva metra
Niveles nueva metra
 
Ushtrimi 9
Ushtrimi 9Ushtrimi 9
Ushtrimi 9
 
Garabato Diciembre 2015
Garabato Diciembre 2015Garabato Diciembre 2015
Garabato Diciembre 2015
 
Букин Д.Ю. Мультимедийные ресурсы
Букин Д.Ю. Мультимедийные ресурсыБукин Д.Ю. Мультимедийные ресурсы
Букин Д.Ю. Мультимедийные ресурсы
 
Cómo educar en valores
Cómo educar en valoresCómo educar en valores
Cómo educar en valores
 
Logros en recursos e instalaciones
Logros en recursos e instalacionesLogros en recursos e instalaciones
Logros en recursos e instalaciones
 
công ty hiếu ngọc-tay son,binh dinh
công ty hiếu ngọc-tay son,binh dinhcông ty hiếu ngọc-tay son,binh dinh
công ty hiếu ngọc-tay son,binh dinh
 
Christmas in italy
Christmas in italyChristmas in italy
Christmas in italy
 
CERTIFICATE_14
CERTIFICATE_14CERTIFICATE_14
CERTIFICATE_14
 
La tecnologia y sus multiples relaciones
La tecnologia y sus multiples relacionesLa tecnologia y sus multiples relaciones
La tecnologia y sus multiples relaciones
 
Baby Centre Mobile Mum Report
Baby Centre Mobile Mum ReportBaby Centre Mobile Mum Report
Baby Centre Mobile Mum Report
 
Comp.Org. Nitr.
Comp.Org. Nitr.Comp.Org. Nitr.
Comp.Org. Nitr.
 
Silk'n Glide Depiladora Luz Pulsada
Silk'n Glide Depiladora Luz Pulsada
Silk'n Glide Depiladora Luz Pulsada
Silk'n Glide Depiladora Luz Pulsada
 
CAWASA e-Source Newsletter - Issue 5 : January - June 2013
CAWASA e-Source Newsletter - Issue 5 : January - June 2013 CAWASA e-Source Newsletter - Issue 5 : January - June 2013
CAWASA e-Source Newsletter - Issue 5 : January - June 2013
 
petit-papa-noel
 petit-papa-noel petit-papa-noel
petit-papa-noel
 
Tolerancias dimensionales 1
Tolerancias dimensionales 1Tolerancias dimensionales 1
Tolerancias dimensionales 1
 
Juego tradicional frente al juego digital (grupo 13)
Juego tradicional frente al juego digital (grupo 13)Juego tradicional frente al juego digital (grupo 13)
Juego tradicional frente al juego digital (grupo 13)
 
Vendemore Pres Event Conductive "Strategic Product Management"
Vendemore Pres Event Conductive "Strategic Product Management"Vendemore Pres Event Conductive "Strategic Product Management"
Vendemore Pres Event Conductive "Strategic Product Management"
 
PKS Stainless Steel Marking
PKS Stainless Steel MarkingPKS Stainless Steel Marking
PKS Stainless Steel Marking
 
три A маркетинговых компаний от Digital Boutique
три A маркетинговых компаний от Digital Boutiqueтри A маркетинговых компаний от Digital Boutique
три A маркетинговых компаний от Digital Boutique
 

Similar to Black Friday Kicks Off Holiday Cyber-Crime Season

Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Javier Gonzalez
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? XNSPY
 
Cybercriminals and security attacks
Cybercriminals and security attacksCybercriminals and security attacks
Cybercriminals and security attacksGFI Software
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye, Inc.
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCMicrosoft Asia
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Securitylearntransformation0
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022ManviShukla4
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 

Similar to Black Friday Kicks Off Holiday Cyber-Crime Season (20)

Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year?
 
Cybercriminals and security attacks
Cybercriminals and security attacksCybercriminals and security attacks
Cybercriminals and security attacks
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat Report
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Data Breach Risk Intelligence
Data Breach Risk IntelligenceData Breach Risk Intelligence
Data Breach Risk Intelligence
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 

Recently uploaded

M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 

Recently uploaded (20)

M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 

Black Friday Kicks Off Holiday Cyber-Crime Season

  • 1. JOY TO THE WORLD Next-Gen Vulnerability Management Secures Holiday Shopping Top Retail Sales Days1 Cyber-criminals don’t take the Holidays off! Thefts of payment card data and other Personally Identifiable Information (PII) will result in big losses for consumers and merchants.2 est. xxx-xx-xxxx Holiday Shopping Activity Black Friday Weekend: During peak holiday shopping season, InfoSec teams at merchants, banks and service providers are in production-freeze. What matters most is maintaining the flow of commerce.3 2011 2012 2013 247 226 Shoppers in Millions $61.4 est. $59.1 $52.4 255 est. Holiday Shopping in Billions Cyber-crime delivers a lump of coal — $388 Billion in worldwide costs 4 70% 47,000+ 621 of all cybercrime is financially motivated reported security incidents confirmed data disclosures 44 Million+ 52% 66% reported breaches involved hacking compromised records reported breaches took months to discover I’m Dreaming of a Mobile Christmas Consumers will use smartphones for holiday shopping and m-commerce.5 56% 45% 36% 54% 44% 32% 47% 40% 31% Mobile Safety Tips Wi-Fi hotspots: Protect your $$: Almost 40% don’t take even minimal security measures: Naughty Apps!: Limit the type of business you conduct and adjust the security settings on your device to limit who can access your phone.6 When banking and shopping, check to be sure the site is security enabled. Look for web addresses with "https://" or "shttp://," which means the site secures your information. "Http://" is not secure.6 Use a screen lock, back up data, and install an app to locate a missing phone and remotely erase data from it.7 When in doubt, don't respond: Fradulent texting, calling and voicemails are on the rise. Just like email, requests for personal information or for immediate action are almost always a scam.6 Beware of legit-looking, but potentially malicious shopping apps from dubious sources. Only download apps signed by reputable retailers. Holiday-Induced Vulnerability Bloat 8 Happy New Year! Even if they reach January 2014 with nary a hack or breach, infosec teams must catch up on time-consuming system updates and patching projects while preparing for annual compliance assessments.8 Remotely Exploitable Vulnerabilities Nov. — Dec. 2012 Jan. 2013 What is Tenable Next-Generation Vulnerability Management? Tenable SecurityCenter Continuous View is the industry’s only next-generation vulnerability management platform. It combines scan data, network intelligence and activity logs collected from Tenable’s industry leading sensors, Nessus, Passive Vulnerability Scanner and Log Correlation Engine, to deliver the most advanced analysis of security risks and compliance exposure present in enterprise IT environments. Learn more: www.tenable.com/next-gen. Sources 1: Mastercard’s Projected Top Shopping Days for 2013 (released on 11/20/2013) 2: Capgemini World Payments Report 2013 & http://www.nrf.com/modules.php?name=Pages&sp_id=1140 3: About.com, http://useconomy.about.com/od/demand/f/Black_Friday.htm 4: Verizon, 2013 Verizon Data Breach Investigations Report 5:http://www.internetretailer.com/2013/10/24/mobile-devices-will-play-big-role-2013-holiday-shopping 6:http://staysafeonline.org/stay-safe-online/mobile-and-on-the-go/mobile-devices 7: http://consumerreports.org/privacy0613 8: http://web.nvd.nist.gov/view/vuln/statistics © 2013 Tenable Network Security, Inc.