44
2016 Cyber Security Threat Report

2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

2016 Cyber SecurityThreat Report

Page 2: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Read the Report

Symantec Internet Security Threat

Report 2016

https://www.symantec.com/security-center/threat-report

Page 3: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Data Breaches & Privacy

Page 4: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Data Breaches

Page 5: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Data Breaches

Page 6: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Largest Data Breaches in 2015

10 Million Records

Page 7: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Largest Data Breaches in 2015

11 Million Records

Page 8: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Largest Data Breaches in 2015

11.3 Million Records

Page 9: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Largest Data Breaches in 2015

15 Million Records

Page 10: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Largest Data Breaches in 2015

21.5 Million Records

Page 11: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Largest Data Breaches in 2015

37 Million Records

Page 12: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Largest Data Breaches in 2015

80 Million Records

Page 13: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Data Breaches in 2015

Page 14: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Top Causes of Data Breaches by Incident

Page 15: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Top Causes of Data Breaches by Records

Page 16: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Vulnerabilities

Page 17: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Websites with Vulnerabilities

Page 18: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Browser Vulnerabilities

Page 19: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Browser Plugin Vulnerabilities

Page 20: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Zero Day Vulnerabilities

ONE NEW ZERO DAY VULNERABILITY

DISCOVERED EVERY WEEK IN 2015

Page 21: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Zero Day Vulnerabilities

Page 22: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Zero Day Vulnerabilities

Almost 20%of all zero-days

involved Adobe Flash

Page 23: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Zero Day Vulnerabilities

4 out of 5 of the exploited zero-days

involved Adobe Flash

Page 24: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Crypto-Ransomware Rise

Page 25: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Crypto-Ransomware Rise

Page 26: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Social Media, Scams & Email Threats

Page 27: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Gmail Scam

Page 28: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Sextortion

•Scammers use an attractive profile picture and encourage the intended victim to share sexually explicit videos. •The criminals then encourage the victim to “continue the liaison” using an Android app which also gathers the victim’s phone number, account details and all of their contacts.

•The criminals now threaten to send the explicit content to the victims contact list unless a ransom is paid.

Page 29: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Social Media Scams

Page 30: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Social Media Safeguards•Be skeptical of new followers. If a random person follows you, do not automatically follow them back. Look at their tweets. Are they retweeting content that looks like spam? If they are, they are most likely a bot.•Numbers can lie. Even if these random followers have tens of thousands of followers, those numbers can easily be faked. Do not base your decision to follow them back based on how many people follow them.•Look for the “verified” badge. Twitter users should always check to see if a well-known brand or famous celebrity has been verified by Twitter before following. The blue verified badge denotes that Twitter has authenticated the true owner of an account.

Page 31: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Spam

Page 32: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Mass Phishing

Page 33: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Spear Phishing

Page 34: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Spear Phishing Industries Targeted

Page 35: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Spear Phishing Organization Size

Page 36: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Email SafeguardsOrganizations and individuals need to realize that even if they do not think they are an obvious target for cybercriminals, it does not mean they are immune.

On a personal level, this means remaining vigilant by:• Not opening emails from unknown senders• Looking for the padlock and checking the encryption certificate on any sites

where you enter sensitive data• Not using unsecure networks when accessing sensitive data

For organizations to remain vigilant by:• Deploying email encryption where possible• Ensuring that email is scanned for malware, spam, and phishing• Using web security systems to block access to known phishing sites

Page 37: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Mobile & Internetof Things

Page 38: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Mobile Vulnerabilities by OS

Page 39: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Android Malware Volume

Page 40: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Ransomware Goes Mobile

Page 41: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Internet of Things

Page 42: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Insecurity of Things•Cars – Fiat Chrysler recalled 1.4 million vehicles after researchers took control of the vehicle remotely•Smart Home – Multiple unpatched vulnerabilities in commercially available products. Researchers remotely opened a “smart” door lock.•Medical Devices – Researchers have found potentially deadly vulnerabilities in dozens of devices such as insulin pumps and implantable defibrillators.•Smart TVs – Researchers claim hundreds of millions of TVs are potentially vulnerable to all kinds of fraud, even ransomware.•Embedded devices – Routers, webcams, IP phones share the same hard coded SSH and HTTPS server certificates.

Page 43: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Read the Report

Symantec Internet Security Threat

Report 2016

https://www.symantec.com/security-center/threat-report

Page 44: 2016 Cyber Security Threat Report - Region One ESC...Read the Report Symantec Internet Security Threat Report 2016

Contact Information:

Peter J. Vasquez Sr., MSCS, CISSPE-Mail: [email protected]

Phone: (956) 467-0667