SlideShare uma empresa Scribd logo
1 de 16
What Cybercriminals Want: Company Data
Extremely secure
SUMMARY
1. Introduction
2. The What, Why and Wherefore of Data Loss
3. How Do Cybercriminals Steal Data ?
4. How the Loss of Company Data Affects your Business
5. How to Protect your Company Data
Page 2Cybersecurity
1. INTRODUCTION
Page 3Cybersecurity
Data is big, data is valuable and data is trouble.
Data loss affects all of us, as individuals and within an
organization. It affects all types of companies no
matter what size they are.
Data loss and theft are the most common types of
cybercrime according to PWC.
The UK is the worst hit nation in Europe with 93% of
large UK organizations reporting a breach in 2013.
78%
more breaches have been
recorded in 2014
by Breach Level Index.
340 million
breaches have been
recorded in the first
two quarters of 2015.
1. INTRODUCTION
Page 4Cybersecurity
Data loss and theft are the most common types
of cybercrime according to PWC.
The top four types of security incidents are:
 Computer records compromised
 Employee records compromised
 Loss or damage of internal records
 Loss of intellectual property
According to report from the Global State of Information Security 2016.
Cybersecurity
1. INTRODUCTION
5
One of the biggest and most far reaching was the health care insurance provider
Anthem, where a breach in late 2014 impacted almost 80 million customer records.
Carphone Warehouse and partner Experian lost the personal data
of 2.4 million customers.
2015 was a year marked by high levels of data loss and theft.
All market sectors are being targeted and there are many examples
within the healthcare, financial and government sectors.
In Germany almost 18 million personal details of German citizens
were stolen from the server of German Bundestag
Cybersecurity
2. THE WHAT, WHY AND WHEREFORE OF DATA LOSS
6
Price Waterhouse Coopers estimated that the loss of trade secrets (IP) may be as high as
$2.2 trillion annually. Over the same period, they found that IP theft increased by 56%
in 2015.
Cyberespionage / Intellectual Property theft
Company financial details
There are a number of methods that are used to obtain access to company bank
accounts. One example is shown in a recent FBI warning about company bank fraud,
perpetrated by business email account being compromised.
Cybersecurity
2. THE WHAT, WHY AND WHEREFORE OF DATA LOSS
7
This is becoming an increasing problem as PII is being used for web services as a method
of identification and for identity assurance purposes.
This means that once an individual’s personal information is out for sale on the
cybercrime black market, it can be used for other attacks as was seen in the IRS exploit.
Personally Identifying Information - PII / identity theft
Data records
Data records are distinct from PII and can contain proprietary company information or
items such as medical scans and so on.
Stolen records can go onto the black market, fetching hundreds of dollars per record. The
average cost of a health record, for example is $363.
Cybersecurity
3. HOW DO CYBERCRIMINALS STEAL DATA?
8
Tactics used
to exploit
information
Advanced Persistent
Threat (APT)
Phishing and spear
phishing
Insider Threat
Malware
Cybersecurity
3. HOW DO CYBERCRIMINALS STEAL DATA?
9
This takes the form of a long lasting and slow exfiltration of data. It is most
commonly used to extract proprietary information, such as intellectual property.
An example of such an attack was performed on Google in 2009.
In this attack, nicknamed « Operation Aurora », it was alleged that Chinese
hackers (possibly government sponsored) were behind the attack on the company’s
intellectual property.
The APT was a typical attack where malware used a software vulnerability,
known as a zero day exploit, which is where a software vulnerability is unknown to
the vendor and therefore remains vulnerable.
The malware then sent data back to a « command and control » center operated by
hackers. APT’s can lay undetected for long periods, during which time they send
stolen information back to the central command center.
Advanced Persistent Threat (APT)
Cybersecurity
3. HOW DO CYBERCRIMINALS STEAL DATA?
1
0
Phishing is one of the most popular methods
of getting malware onto a computer.
It was estimated in a report « State of the
Phish » that in 2013-14, 95% of all
cyberespionage attacks and 80% of all malware
infections originated in a phishing or spear
phishing email.
Once infected, malware or spoof websites are
used to exfiltrate data, including login
credentials for company resources such as
databases.
Phishing and spear phishing
Cybersecurity
3. HOW DO CYBERCRIMINALS STEAL DATA?
1
1
This type of threat covers a gamut of issues,
both malicious and non-malicious.
Simple loss of data due to carelessness is a
continuing problem for companies.
Simple mis-delivery of emails, for example,
causes up to 44% of data disclosure errors
according to a Verizon report.
Insider threat
Cybersecurity
3. HOW DO CYBERCRIMINALS STEAL DATA?
1
2
One particularly sinister form of malware is ransomware.
This is where the malware encrypts your data, not only on your hard drive, but
potentially out into the network and even Cloud storage.
Once encrypted the cybercriminal presents a screen asking for money and if you
pay up they « promise » to decrypt the data.
Ransomware has exploded recently, up by 165% according to McAfee. And the costs
for this type of malware, alone, were around $18 million in 2014.
Malware
Cybersecurity
4. HOW THE LOSS OF COMPANY DATA AFFECTS YOUR BUSINESS
1
3
Loss of data isn’t just about the financial
implications of the loss. It also affects your
company brand and reputation.
And fines for non-compliance when customer
records and PII are stolen are becoming more
common place and also affect company
directors.
And data protection laws, which exist in most
countries, are applied to company directors
resulting in large fines.
Cybersecurity
4. HOW THE LOSS OF COMPANY DATA AFFECTS YOUR BUSINESS
1
4
In the UK the Ministry of Justice was fined £180,000 for the loss of almost
19,000 prison records when an unencrypted and non-password protected
portable hard drive went missing.
In the USA, the Target breach of late 2013 which saw the loss of around 40
million customer card details and 70 million customers PII, resulted in a
suite of class actions against the company.
The U.S. Federal Trade Commission has a specific clause in their Act for Unfair or
Deceptive Acts or Practices, which allows them to go after the directors of a
company who haven’t used sufficient protection to prevent a loss of
customer data.
Cybersecurity
5. HOW TO PROTECT YOUR COMPANY DATA
1
5
There are mechanisms and tools that can help you minimize the risks coming your way
from cybercriminals and even from accidental data loss by employees.
Understand how your data flows within your organization – both
internally and with the outside world, especially via the Internet.
Mapping your data flows is a fundamental part of your security
strategy and will allow you to create a game plan for data protection.
Take the form of employee education, to allow, for example a
person to recognize a phishing attempt.
Using the right tools for the job is also an integral part of your
overall security strategy for data protection.
Protecting application and data access - many data breaches
start with the loss or theft of credentials.
company/united-security-providers
companies/unitedsecurityprovidersag
https://www.united-security-providers.ch

Mais conteúdo relacionado

Mais procurados

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
VidaB
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 

Mais procurados (20)

IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
 
Critical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachCritical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target Breach
 
Jitter Bugslec
Jitter BugslecJitter Bugslec
Jitter Bugslec
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Target Breach Analysis
Target Breach AnalysisTarget Breach Analysis
Target Breach Analysis
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 

Destaque

The Effect Of Lack Of Security On Industry
The Effect Of Lack Of Security On IndustryThe Effect Of Lack Of Security On Industry
The Effect Of Lack Of Security On Industry
lilian91
 
What is your Intellectual Property Worth? Methods for Determining Value
What is your Intellectual Property Worth? Methods for Determining ValueWhat is your Intellectual Property Worth? Methods for Determining Value
What is your Intellectual Property Worth? Methods for Determining Value
CONSOR Intellectual Asset Management
 
Information security threats
Information security threatsInformation security threats
Information security threats
complianceonline123
 

Destaque (9)

Managing the Cyberthreat Landscape
Managing the Cyberthreat LandscapeManaging the Cyberthreat Landscape
Managing the Cyberthreat Landscape
 
How to commit corporate espionage (10 Card Deck)
How to commit corporate espionage (10 Card Deck)How to commit corporate espionage (10 Card Deck)
How to commit corporate espionage (10 Card Deck)
 
Présentation - atelier War Room
Présentation - atelier War RoomPrésentation - atelier War Room
Présentation - atelier War Room
 
Corporate espionage
Corporate espionageCorporate espionage
Corporate espionage
 
The Effect Of Lack Of Security On Industry
The Effect Of Lack Of Security On IndustryThe Effect Of Lack Of Security On Industry
The Effect Of Lack Of Security On Industry
 
What is your Intellectual Property Worth? Methods for Determining Value
What is your Intellectual Property Worth? Methods for Determining ValueWhat is your Intellectual Property Worth? Methods for Determining Value
What is your Intellectual Property Worth? Methods for Determining Value
 
Corporate-Espionage
Corporate-EspionageCorporate-Espionage
Corporate-Espionage
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Trade Secrets 2011 University Basics
Trade Secrets 2011 University Basics Trade Secrets 2011 University Basics
Trade Secrets 2011 University Basics
 

Semelhante a What Cybercriminals Want: Company Data – by United Security Providers

White Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US LocalizedWhite Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US Localized
Stuart Clarke
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
mharbpavia
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
jsnyder40
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
IJERD Editor
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattsson
Ulf Mattsson
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
at MicroFocus Italy ❖✔
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
tidwellveronique
 

Semelhante a What Cybercriminals Want: Company Data – by United Security Providers (20)

DATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali RangoliyaDATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali Rangoliya
 
Cyber security
Cyber securityCyber security
Cyber security
 
White Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US LocalizedWhite Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US Localized
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattsson
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of Hacking
 
Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WP
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 

Último

₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 

Último (20)

VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 

What Cybercriminals Want: Company Data – by United Security Providers

  • 1. What Cybercriminals Want: Company Data Extremely secure
  • 2. SUMMARY 1. Introduction 2. The What, Why and Wherefore of Data Loss 3. How Do Cybercriminals Steal Data ? 4. How the Loss of Company Data Affects your Business 5. How to Protect your Company Data Page 2Cybersecurity
  • 3. 1. INTRODUCTION Page 3Cybersecurity Data is big, data is valuable and data is trouble. Data loss affects all of us, as individuals and within an organization. It affects all types of companies no matter what size they are. Data loss and theft are the most common types of cybercrime according to PWC. The UK is the worst hit nation in Europe with 93% of large UK organizations reporting a breach in 2013. 78% more breaches have been recorded in 2014 by Breach Level Index. 340 million breaches have been recorded in the first two quarters of 2015.
  • 4. 1. INTRODUCTION Page 4Cybersecurity Data loss and theft are the most common types of cybercrime according to PWC. The top four types of security incidents are:  Computer records compromised  Employee records compromised  Loss or damage of internal records  Loss of intellectual property According to report from the Global State of Information Security 2016.
  • 5. Cybersecurity 1. INTRODUCTION 5 One of the biggest and most far reaching was the health care insurance provider Anthem, where a breach in late 2014 impacted almost 80 million customer records. Carphone Warehouse and partner Experian lost the personal data of 2.4 million customers. 2015 was a year marked by high levels of data loss and theft. All market sectors are being targeted and there are many examples within the healthcare, financial and government sectors. In Germany almost 18 million personal details of German citizens were stolen from the server of German Bundestag
  • 6. Cybersecurity 2. THE WHAT, WHY AND WHEREFORE OF DATA LOSS 6 Price Waterhouse Coopers estimated that the loss of trade secrets (IP) may be as high as $2.2 trillion annually. Over the same period, they found that IP theft increased by 56% in 2015. Cyberespionage / Intellectual Property theft Company financial details There are a number of methods that are used to obtain access to company bank accounts. One example is shown in a recent FBI warning about company bank fraud, perpetrated by business email account being compromised.
  • 7. Cybersecurity 2. THE WHAT, WHY AND WHEREFORE OF DATA LOSS 7 This is becoming an increasing problem as PII is being used for web services as a method of identification and for identity assurance purposes. This means that once an individual’s personal information is out for sale on the cybercrime black market, it can be used for other attacks as was seen in the IRS exploit. Personally Identifying Information - PII / identity theft Data records Data records are distinct from PII and can contain proprietary company information or items such as medical scans and so on. Stolen records can go onto the black market, fetching hundreds of dollars per record. The average cost of a health record, for example is $363.
  • 8. Cybersecurity 3. HOW DO CYBERCRIMINALS STEAL DATA? 8 Tactics used to exploit information Advanced Persistent Threat (APT) Phishing and spear phishing Insider Threat Malware
  • 9. Cybersecurity 3. HOW DO CYBERCRIMINALS STEAL DATA? 9 This takes the form of a long lasting and slow exfiltration of data. It is most commonly used to extract proprietary information, such as intellectual property. An example of such an attack was performed on Google in 2009. In this attack, nicknamed « Operation Aurora », it was alleged that Chinese hackers (possibly government sponsored) were behind the attack on the company’s intellectual property. The APT was a typical attack where malware used a software vulnerability, known as a zero day exploit, which is where a software vulnerability is unknown to the vendor and therefore remains vulnerable. The malware then sent data back to a « command and control » center operated by hackers. APT’s can lay undetected for long periods, during which time they send stolen information back to the central command center. Advanced Persistent Threat (APT)
  • 10. Cybersecurity 3. HOW DO CYBERCRIMINALS STEAL DATA? 1 0 Phishing is one of the most popular methods of getting malware onto a computer. It was estimated in a report « State of the Phish » that in 2013-14, 95% of all cyberespionage attacks and 80% of all malware infections originated in a phishing or spear phishing email. Once infected, malware or spoof websites are used to exfiltrate data, including login credentials for company resources such as databases. Phishing and spear phishing
  • 11. Cybersecurity 3. HOW DO CYBERCRIMINALS STEAL DATA? 1 1 This type of threat covers a gamut of issues, both malicious and non-malicious. Simple loss of data due to carelessness is a continuing problem for companies. Simple mis-delivery of emails, for example, causes up to 44% of data disclosure errors according to a Verizon report. Insider threat
  • 12. Cybersecurity 3. HOW DO CYBERCRIMINALS STEAL DATA? 1 2 One particularly sinister form of malware is ransomware. This is where the malware encrypts your data, not only on your hard drive, but potentially out into the network and even Cloud storage. Once encrypted the cybercriminal presents a screen asking for money and if you pay up they « promise » to decrypt the data. Ransomware has exploded recently, up by 165% according to McAfee. And the costs for this type of malware, alone, were around $18 million in 2014. Malware
  • 13. Cybersecurity 4. HOW THE LOSS OF COMPANY DATA AFFECTS YOUR BUSINESS 1 3 Loss of data isn’t just about the financial implications of the loss. It also affects your company brand and reputation. And fines for non-compliance when customer records and PII are stolen are becoming more common place and also affect company directors. And data protection laws, which exist in most countries, are applied to company directors resulting in large fines.
  • 14. Cybersecurity 4. HOW THE LOSS OF COMPANY DATA AFFECTS YOUR BUSINESS 1 4 In the UK the Ministry of Justice was fined £180,000 for the loss of almost 19,000 prison records when an unencrypted and non-password protected portable hard drive went missing. In the USA, the Target breach of late 2013 which saw the loss of around 40 million customer card details and 70 million customers PII, resulted in a suite of class actions against the company. The U.S. Federal Trade Commission has a specific clause in their Act for Unfair or Deceptive Acts or Practices, which allows them to go after the directors of a company who haven’t used sufficient protection to prevent a loss of customer data.
  • 15. Cybersecurity 5. HOW TO PROTECT YOUR COMPANY DATA 1 5 There are mechanisms and tools that can help you minimize the risks coming your way from cybercriminals and even from accidental data loss by employees. Understand how your data flows within your organization – both internally and with the outside world, especially via the Internet. Mapping your data flows is a fundamental part of your security strategy and will allow you to create a game plan for data protection. Take the form of employee education, to allow, for example a person to recognize a phishing attempt. Using the right tools for the job is also an integral part of your overall security strategy for data protection. Protecting application and data access - many data breaches start with the loss or theft of credentials.