Cyber Security Vulnerabilities - PowerPoint PPT Presentation

About This Presentation
Title:

Cyber Security Vulnerabilities

Description:

Social engineering and human error present the single biggest threat to companies in 2017. In fact, 60% of enterprise companies were targeted by social engineering attacks within the last year. As cyber security automation practices get better, attackers are increasingly relying on social engineering to make their way into systems and networks. Visit- – PowerPoint PPT presentation

Number of Views:102
Slides: 11
Provided by: Siemplify
Category:
Tags:

less

Transcript and Presenter's Notes

Title: Cyber Security Vulnerabilities


1
Cyber Security Vulnerabilities
  • 4 Emerging Vulnerabilities To Know

2
Introduction
  • Cyber security is an industry that is constantly
    in flux. As new technology becomes available
    particularly internet connected technology
    attackers have more points of access into
    critical systems and networks. Forward-thinking
    companies must always re-analyze the landscape to
    detect upcoming threats and put the proper
    protections in place.

3
Cyber Security Vulnerability Vectors
  • In recent years, we have seen new technology that
    leads to a number of new channels become
    increasingly common vectors of attack. Social
    engineering and phishing have made their way into
    the common vernacular as attackers seek to find
    their way into systems through human error. As
    your company looks for emerging cyber security
    vulnerability vectors to protect themselves
    against, keep these four emerging threats in
    mind

4
Social Engineering Vulnerabilities
  • Social engineering and human error present the
    single biggest threat to companies in 2017. In
    fact, 60 of enterprise companies were targeted
    by social engineering attacks within the last
    year. As cyber security automation practices get
    better, attackers are increasingly relying on
    social engineering to make their way into systems
    and networks.

5
Different Methods of Social Engineering
  • Phishing is the most popular method of social
    engineering. A phishing attack typically involves
    tricking the user into entering sensitive
    information by mimicking another popular website.
  • Another commonly used attack, which is in part
    social engineering, is ransomware. Ransomware
    attacks take control of your device and demand a
    ransom to remove the damaging software.

6
Mobile Malware Vulnerabilities
  • Mobile malware is becoming an increasingly
    serious threat to organizations of all sizes.
    With each passing year, more people are on
    mobile. In fact, the total time spent in front of
    a mobile device is on track to surpass TV-usage
    in the early 2020s. In 2016, there were more than
    125,000 separate mobile banking trojans
    discovered. Proper training for employees and
    industry-standard mobile cyber security measures
    can go a long way to protect your company against
    mobile threats.

7
Cloud Vulnerabilities
  • Storing data in the cloud is a pretty sensible
    thing for a company to do. Most cloud providers
    offer solid security, allowing companies to
    reduce their data storage costs significantly.
    However, the one downside of storing important
    business data in the cloud is that it makes it a
    very valuable target for hackers. Cloud service
    providers come under attack increasingly often.

8
Internet of Things Vulnerabilities
  • In 2017 there are more than 6.5 billion connected
    things in the world. Care sensors,
    refrigerators, pacemakers and security systems
    around the world are accessible to would-be
    attackers. This expansion should give companies
    concerned about increases in security threats.
    The Research firm IDC is predicting that by 2018,
    two-thirds of all organizations will experience
    some kind of internet-of-things security breach.

9
Conclusion
  • Staying ahead of the rapidly changing
    attack-types can reduce cyber security
    vulnerabilities for any organization but can be a
    difficult task. Many organizations are still
    trying to adequately protect themselves from
    todays technologies. However, with some forward
    thinking and a willingness to invest, companies
    can put themselves in a better position. Keep an
    eye on these four channels as they continue to
    emerge and as threats through them become
    increasingly commonplace.

10
References
  • https//www.siemplify.co/blog/cyber-security-vulne
    rabilities/
  • https//www.siemplify.co/blog/5-colossal-cyber-sec
    urity-incidents/
  • https//www.siemplify.co/blog/ransomware-attack-st
    uns-globe-security-orchestration-emerges-answer/
  • https//www.forbes.com/sites/louiscolumbus/2016/11
    /27/roundup-of-internet-of-things-forecasts-and-ma
    rket-estimates-2016/3130e6c4292d
Write a Comment
User Comments (0)
About PowerShow.com