1 / 15

Cyber security and email

Today’s Risk. Today’s Solutions. Cyber security and email. Presented by Gerald Montella, President & CEO Trustifi Corporation. Contents of Presentation. Introduction to Cyber Security Issues Background Information of Cyber Crimes Preventative Measures Market Opportunities for Remediation.

fumikog
Download Presentation

Cyber security and email

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Today’s Risk. Today’s Solutions. Cyber security and email Presented by Gerald Montella, President & CEO Trustifi Corporation

  2. Contents of Presentation • Introduction to Cyber Security Issues • Background Information of Cyber Crimes • Preventative Measures • Market Opportunities for Remediation 2

  3. A Brief History of Cyber Security Issues The First Computer Worm — Late 1980s - Early 1990s Succeeded in shutting down the Internet The First Viruses — 1990s Caused global email failure Credit Cards Under Attack — Late 2000s Cyber attacks become more targeted with the first serial data breach of credit card numbers. The Threat Tsunami — Modern Day Cyber breaches are now board-level issues. Data breaches cost an average $6.53 million per incident. http://www-03.ibm.com/security/data-breach/ http://www.infosecurity-magazine.com/opinions/the-history-of-cybersecurity/

  4. 3

  5. Data Breaches — By the Numbers Since 2005 889,508,931 records have been compromised as the result of data breaches. www.privacyrights.org

  6. The number of email accounts worldwide is expected to increase by 6% — from over 3.9 billion in 2013 to over 4.9 billion by the end of 2017. • The go-to form of communication in the business world is email. Business email is expected to grow at an average annual growth rate of about 5% — from over 929 million e-mailboxes in 2013 to over 1.1 billion by the end of 2017. • The majority of business email accounts are currently deployed on-premises. • In 2013, the majority of email traffic came from business email, which accounted for over 100 billion emails sent and received per day. This trend is expected to continue and will account for over 132 billion emails sent and received per day by the end of 2017. • Consumer email accounts currently account for the vast majority — approximately 76% — of worldwide email accounts. The market share is expected to steadily increase as more people come online and email continues to be a key component of the online experience.

  7. The Radicati Group, Inc.

  8. The Radicati Group, Inc.

  9. Email is often the entry point for all manner of malware attacks. There are at least three hops every email goes through on its way to a recipient. Each of these points may or may not be encrypted. Unencrypted email and its attachment pose a threat to your data security and privacy, and are vulnerable to attack from hackers and other cyber threats. When an email attachment is encrypted it’s often done with subpar techniques like using a locked spreadsheet with a simple password (e.g. abc123) that is easily penetrable.

  10. What Can We Do About Cyberthreats? Preventative Measures Start with security Factor it into the decision making in every department of your business – personnel, sales, accounting, information technology, etc Control access to data sensibly Put controls in place to make sure employees have access only on a “need to know” basis. For your network, consider steps such as separate user accounts to limit access to the places where personal data is stored or to control who can use particular databases. Require secure passwords & authentication If you have personal information stored on your network, strong authentication – including sensible password “hygiene” – can help ensure that only authorized individuals can access the data. Segment your network & monitor who’s trying to get in and out When designing your network, consider using tools like firewalls to segment your network, thereby limiting access between computers on your network and between your computers and the internet. Another useful safeguard: intrusion detection and prevention tools to monitor your network for malicious activity. https://www.ftc.gov/tips-advice/business-center/guidance/start-security-guide-business#segment

  11. Market Opportunities for Remediation Invest in network security. Send secure emails to authenticated recipients. Train your employees to prevent social engineering. Secure the devices used by your company.

  12. Know who’s looking at your email and what they’re doing with it.

  13. Questions

  14. Thank You!

More Related