Slide 1

advertisement
The impact of cybercrime
High level conference on EU ISS – Brussels 2014
Ilias Chantzos, Senior Director Government Affairs EMEA
What is cybercrime?
• Most people think of cybercrime in terms of
consumers being defrauded
• Perception is that targeted attacks happen to
large organisations
• Cybercrime affects consumers and enterpises
• Cybercrime is not just a technology problem
• There is no such thing as a victims’ personal and
professional life for cybercriminals
• We all need to work together to deal with it
• I will not cover the other “cyber issues”
THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME
1 BN
RUSSIA
13 BN
EUROPE
38 BN
3 BN
USA
37 BN
CHINA
4 BN
MEXICO
INDIA
8 BN
1 BN
JAPAN
BRAZIL
1 BN
AUSTRALIA
SOUTH AFRICA
0.3 BN
ALL AMOUNTS IN USD ROUNDED TO THE NEAREST BILLION
CANADA 3 BN; SINGAPORE 1 BN; NEW ZEALAND 0.1 BN; TURKEY 2 BN; SAUDI ARABIA 0.5 BN; UAE 0.3 BN; COLOMBIA 0.5 BN
THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME
$113
BN
ENOUGH TO HOST THE 2012 LONDON
OLYMPICS NEARLY 10 TIMES OVER
83% OF DIRECT FINANCIAL COSTS
ARE A RESULT OF FRAUD,
REPAIRS, THEFT AND LOSS
OTHER 17%
FRAUD 38%
REPAIRS 24%
USD $298
AVERAGE COST PER VICTIM
THEFT OR LOSS
21%
REPRESENTS A 50 PERCENT INCREASE OVER 2012
ALL AMOUNTS IN USD
SEE EXTRAPOLATION CALCULATIONS *
THE SCALE OF CONSUMER CYBERCRIME
378 MILLION VICTIMS PER YEAR
NEARLY 2.8 TIMES AS MANY BABIES BORN EACH YEAR
1 MILLION +
VICTIMS PER DAY
ENOUGH TO FILL WEMBLEY STADIUM (ENGLAND) MORE THAN 10 TIMES
12 VICTIMS PER SECOND
SEE EXTRAPOLATION CALCULATIONS *
Targeted
Internet Security Threat Report 2014 :: Volume 19
6
Targeted
Internet Security Threat Report 2014 :: Volume 19
7
Mega Breaches
• 8 of the top 10 breaches were of more than 10 million
identities
• Average Identities exposed were 4 times greater than 2012
Internet Security Threat Report
2014 :: Volume 19
8
Breaches
• The average number of identities exposed per data breach for
Hacking incidents was approximately 4.7 million.
• Theft or loss of a device was ranked third, and accounted for
27% of data breach incidents.
Internet Security Threat Report
2014 :: Volume 19
9
Targeted
Internet Security Threat Report 2014 :: Volume 19
10
C
SUMERS’ SECURITY IQ – HIGH ON PC, LOW ON MOBILE
DELETE SUSPICIOUS
EMAILS FROM PEOPLE
THEY DON’T KNOW
HAVE AT LEAST A BASIC
FREE ANTIVIRUS SOLUTION
AVOID STORING SENSITIVE
FILES ONLINE
90%
72%
78%
VS.
VS.
VS.
60%
42%
53%
VS.
VS.
VS.
56%
33%
48%
GOOD JOB!
NEEDS
WORK!
NEEDS
WORK!
CONSUMERS PICK CONVENIENCE OVER SAFETY
1/3
62%
ADMIT THE CONVENIENCE OF
CONSTANTLY CONNECTED
OUTWEIGHED ANY POTENTIAL
SECURITY RISKS
AGREE THERE IS NO SUCH
THI G AS ‘ LI E PRI ACY’ I
T DAY’S W RLD
EVEN THOUGH…
46%
7/10
WISH THEY COULD
PERMANENTLY DELETE SOME
OF THEIR PERSONAL ONLINE
CONTENT COMPLETELY
D ’T PUT A YTHI G
SOCIAL NETWORKS THAT THEY
W ULD ’T WA T THEIR
PARENTS / KIDS TO SEE
Ransomware
•
•
•
1
Ransomware exploded globally in 2013
3
With only on line payment options limiting its reach
With 1.5 million internet connected computers even the Palestine Territories is a big enough target
for criminals
13
Ransomware
500% increase
in Ransomware attack in 2013
Internet Security Threat Report
2014 :: Volume 19
14
RISKY BEHAVIOR ON SOCIAL MEDIA
?
LOG OUT
****
?
?
39%
1/4
31%
OF SOCIAL MEDIA USERS
DON’T LOG OUT AFTER
EACH SESSION
OF SOCIAL MEDIA USERS
SHARE THEIR SOCIAL
MEDIA PASSWORDS WITH
OTHERS
OF SOCIAL MEDIA USERS
CONNECT WITH PEOPLE
THEY DO NOT KNOW
12% OF SOCIAL MEDIA USERS SAY SOMEONE HAS HACKED INTO
THEIR SOCIAL NETWORK ACCOUNT AND PRETENDED TO BE THEM
Internet of Things at Home
• New reports confirmed real
world attacks against security
cameras and baby monitors
• Attacks against televisions,
cars and and medical
equipment have been
demonstrated
• Reports of refrigerators
sending SPAM have been
greatly exaggerated
Internet Security Threat Report 2014 :: Volume 19
16
Internet of Things at Home
• Even routers are at risk today
• Linux.Darlloz infect Linux PCs
and IoT devices running Linux
• Linux.Aidra targets cable and
DSL modems
• Infected systems can be used
for:
NAT Router
– DDoS attacks
– Browser redirection
– Even cryptocurriences mining
• Unpatched vulnerabilities and
unchanged default passwords
make this possible
Internet Security Threat Report 2014 :: Volume 19
17
Internet of Things – The Future
Wearable Devices will soon be
measuring
•
•
•
•
•
•
•
•
Pulse
Weight
Time Slept
Glucose Levels
Blood Pressure
Exposure to sunlight
Teeth Brushing
And more…
As more of our personal information
travels the Internet what will become
of it?
Internet Security Threat Report 2014 :: Volume 19
TOP TIPS
DEFEND YOUR DATA
A COMPREHENSIVE SECURITY SUITE PROVIDES A STRONG DEFENSE AGAINST ONLINE THREATS.
NORTON 360 MULTI-DEVICE OFFERS PROTECTION FOR PCS, SMARTPHONES AND TABLETS, IN A SINGLE
SOLUTION
THINK OF MOBILE DEVICES AS MINI-COMPUTERS
MOBILE IS THE FASTEST-GROWING TARGET FOR CYBERCRIMINALS. MAKE SURE YOUR MOBILE DEVICE
REQUIRES A PASSWORD, AND TAKE PRECAUTIONS TO ENSURE YOUR DEVICE IS PROTECTED AGAINST
THEFT, LOSS AND CYBERCRIME
BE CAUTIOUS IN THE CLOUD
WHILE CLOUD STORAGE SOLUTIONS MAKE IT EASY TO SAVE AND SHARE FILES, THEY ALSO OPEN
OTHER AVENUES FOR ATTACK. BE CAREFUL ABOUT WHO HAS ACCESS TO YOUR FILES, AND USE A
SOLUTION WITH BUILT-IN SECURITY IF POSSIBLE
SAVE SENSITIVE TRANSACTIONS FOR SECURE CONNECTIONS
FREE OR UNSECURED WI-FI NETWORKS CAN MAKE IT EASY FOR THIEVES TO EAVESDROP ON YOUR
ACTIVITY. AVOID DOING ANY SENSITIVE TRANSACTIONS LIKE BANKING OR SHOPPING WHILE
CONNECTED TO THESE NETWORKS, OR USE A PERSONAL VPN CLIENT
AFTER YOU CONNECT, DOUBLE CHECK
CHECK CREDIT CARD AND BANK STATEMENTS REGULARLY FOR FRAUDULENT TRANSACTIONS, AND
REPORT ANY SUSPICIOUS ACTIVITY TO YOUR PROVIDER AND/OR LAW ENFORCEMENT
THANK YOU
Download