1 / 9

The New Threat Landscape: Changes in Cyberthreats and Security for Small & Medium Business

Explore the evolving cyberthreat landscape and the increasing risks faced by small and medium-sized businesses. Discover the statistics, trends, and impacts of cyberattacks, and uncover the need for new solutions like endpoint detection and response. Learn how to protect your organization, reduce downtime, and prevent costly attacks.

cshouse
Télécharger la présentation

The New Threat Landscape: Changes in Cyberthreats and Security for Small & Medium Business

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The New Threat LandscapeChanges in cyberthreats and security for small & medium business Use this slide as your title slide. You can add your own messaging here.

  2. The Statistics: Ponemon Institute 2018 • 67% of small and medium-sized businesses affected by a cyberattack • 82% of attacks were not caught by traditional AV • 61% of SMBs attacked by ransomware • 70% paid the ransom at an average of $1,466 per incident It’s not a matter of “if” but “when.” ”2018 State of Cybersecurity in Small & Medium Size Businesses,” Ponemon Institute. https://keepersecurity.com/assets/pdf/Keeper-2018-Ponemon-Report.pdf (Published November 2018, Accessed April 2019)

  3. The Threat Is Increasing: 2017 vs. 2018 • Data breaches are up by 4% • Cyberattacks are up by 6% • Ransomware incidents are up by 9% The problem is only getting worse. ”2018 State of Cybersecurity in Small & Medium Size Businesses,” Ponemon Institute. https://keepersecurity.com/assets/pdf/Keeper-2018-Ponemon-Report.pdf (Published November 2018, Accessed April 2019)

  4. Traditional Threats • Easily recognized • Not motivated by money • Required technical knowledge to create and deploy

  5. New Threats • Malware transforming faster than industry can keep up(350,000 New Variations Per Day1) • Viruses and ransomware are a criminal enterprise(Ransomware payments in 2017 will hit a record $2 billion2) • Threats don’t always look like threats at first 1 “Solving the AV Problem,” SentinelOne. https://www.sentinelone.com/wp-content/uploads/2017/06/Solving-the-AV-problem.pdf (Accessed April 2019) 2 “Ransomware is now a $2 billion-per-year criminal industry,” CyberScoop. https://www.cyberscoop.com/ransomware-2-billion-bitdefender-gpu-encryption/ (Published November 2017, Accessed April 2019)

  6. New Threats Require New Solutions Endpoint Detection and Response • Real-time protection for known and unknown threats • Protection from polymorphic and disguised threats • Watches processes as they run in case they “turn bad” • Allows quick rollback to a known good state when an attack does occur • Rollback includes restoring files encrypted by ransomware

  7. Benefits • Reduced downtime • Faster recovery through rollback remediation • Protected outside of network • Ransomware protection

  8. The ROI of Preventing Attacks • 56% of decision makers report a ransomware attack on their organization1 • 67% of SMBs affected in 20182 • Cost to return to normal • 25% of 40 devices = 10 devices • 10 Devices x 1 hour to remediate @ $100/hour = $1000 • PLUS $1,466 per device ransom • $15,660 • Does not include lost sales, productivity, or employee salaries 1 “SentinelOne: Global Ransomware Study 2018,” SentinelOne. https://go.sentinelone.com/rs/327-mnm-087/images/ransomware%20research%20data%20summary%202018.pdf (Published March 2018, accessed April 2019) 2 “2018 State of Cybersecurity in Small & Medium Size Businesses,” Ponemon Institute. https://keepersecurity.com/assets/pdf/Keeper-2018-Ponemon-Report.pdf (Published November 2018, accessed April 2019)

  9. Title • Us this slide as your call to action silde. What action would you like your customers to take at the conclusion of your meeting?

More Related