Upload
others
View
6
Download
0
Embed Size (px)
Citation preview
paid in ransomby companies
in Q1
$209Million
NEW families ofransomware
62ransomware
modificationsby end of Q3
54,000
RansomwareAttacks Daily
Don’t Let Your Device Become a Hostage
R a n S W a r EO m
With the advancements of internet and technology, it is now a digital world. Our most vital and confidential information is aggregated to our computers and devices. This has become an extremely lucrative resource for hackers
by employing ransomware, targeting end users and companies.
Sources:Federal Bureau of Investigation:"Ransomware Prevention and Response for CISOs"Kaspersky Security Bulletin Statistics 2016
Powered by Zyxel USGLearn more at http://onesecurity.zyxel.com/
Opening SuspiciousEmail Attachments Malicious Web Links
Clicking on MaliciousAdvertisements Installing Software
InstallAnti-SpamSoftware
ContentFilter
InstallAnti-Virus
InstusionDetection and
ProtectionSystem (IDP)
Methods of Intrusion
1 2 3 4
W A R N I N G P R O C E E D W I T H C A U T I O N
PREVENTDon’t React
1 2 3 4
1,000
2015
4,000
2016