equiinet discussion of cyber threat landscape final 2016

33
EXPERTS ANALYZE 2016's CYBER THREAT LANDSCAPE Presented by: Paul Abruzzo | VP of Innovative Engineering, Equiinet, Inc.

Upload: equiinet

Post on 11-Apr-2017

236 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Equiinet discussion of cyber threat landscape final 2016

EXPERTS ANALYZE

2016's CYBER THREAT

LANDSCAPE

Presented by: Paul Abruzzo | VP of Innovative Engineering, Equiinet, Inc.

Page 2: Equiinet discussion of cyber threat landscape final 2016

LET’S LOOK AT SOME STATS…

Page 3: Equiinet discussion of cyber threat landscape final 2016

The average total

cost of a breach is

4 MILLION

up 29% since 2013

Page 4: Equiinet discussion of cyber threat landscape final 2016

The average cost

per record

breached is

$158

Page 5: Equiinet discussion of cyber threat landscape final 2016

The cost per

record breached

Healthcare

$322

Retail

$172

Transportation

$129

Page 6: Equiinet discussion of cyber threat landscape final 2016

Costs are

continuing

to climb… because

48% of breaches are

malicious attacks,

which cost more to

remediate.

Page 7: Equiinet discussion of cyber threat landscape final 2016

Costs due to

lost business

are higher...

Customer

attrition

2.9%

Page 8: Equiinet discussion of cyber threat landscape final 2016

26% is the likelihood of a

breach happening to

you over 24 months.

Page 9: Equiinet discussion of cyber threat landscape final 2016

OVER

HALF A BILLION

personal information records

stolen or lost in 2015

Page 10: Equiinet discussion of cyber threat landscape final 2016

The largest number

of breaches.

Healthcare

Services

Page 11: Equiinet discussion of cyber threat landscape final 2016

36% of breaches included

medical records.

Page 12: Equiinet discussion of cyber threat landscape final 2016

CURRENT TRENDS IN THE

CYBSERSECURITY LANDSCAPE

Page 13: Equiinet discussion of cyber threat landscape final 2016

SPEAR PHISHING

Page 14: Equiinet discussion of cyber threat landscape final 2016

RANSOMWARE

Page 15: Equiinet discussion of cyber threat landscape final 2016

KNOWN

VULNERABILITIES

Page 16: Equiinet discussion of cyber threat landscape final 2016

THE INTERNET

OF THINGS

Page 17: Equiinet discussion of cyber threat landscape final 2016

Basic requirements for

layer 1 security

Average financial impact

of data breach /

transport

interruption

Basic requirements for

transport security

Choosing the right protection

for my business

Page 18: Equiinet discussion of cyber threat landscape final 2016

THANK YOU

WHAT YOU WANT

FROM YOUR SECURITY VENDOR?

✔ Web Content Filtering and Blocking

✔ Anti-Virus Protection

✔ User-Friendly Interface

✔ 24/7 Support

✔ Best in class Firewall

✔ Secure VoIP

✔ Automated Backup and Recovery

✔ Secure Encryption Technologies

Page 19: Equiinet discussion of cyber threat landscape final 2016

WHAT EQUIINET IS DOING TO

MITIGATE ALL OF THE ABOVE?

Page 20: Equiinet discussion of cyber threat landscape final 2016
Page 21: Equiinet discussion of cyber threat landscape final 2016
Page 22: Equiinet discussion of cyber threat landscape final 2016

Protecting all layers of transport Monitored, managed and supported 24/7.

Page 23: Equiinet discussion of cyber threat landscape final 2016

HOW EQUIINET PROTECTS YOUR BUSINESS

Unified

Threat

Management

Data

Backup &

Recovery

Redundant

Connectivity Branch

Survivability

Page 24: Equiinet discussion of cyber threat landscape final 2016

FIREWALL

Advanced

Packet Inspection Web Content

Filtering

Malware

Protection

& Prevention

Anti-Virus

Page 25: Equiinet discussion of cyber threat landscape final 2016

DATA PROTECTION & RECOVERY

Cloud Storage

Providers

Local Network

Storage

Automated

Off-Site Data

Storage

Page 26: Equiinet discussion of cyber threat landscape final 2016

REDUNDANT CONNECTIVITY

Automated

Failover

4G/LTE Cellular

Modem, Built-In

Maintain

Compliance

Page 27: Equiinet discussion of cyber threat landscape final 2016

BRANCH SURVIVABILITY

Virtual Integrated

Network Appliance

(Cloud Router)

Automated

Failover

Encrypted

Remote-Office

Failover

Page 28: Equiinet discussion of cyber threat landscape final 2016
Page 29: Equiinet discussion of cyber threat landscape final 2016

Each INA sized and scaled for

increasing employee cohorts. All EquiiOS devices come standard with:

● Best-in-Class Enterprise-Grade Firewall

● WAN Optimization and Failover (4G/LTE)

● Easy VLAN and L2 Network Management

● Built-in WiFi Access Point

● Bandwidth Optimization and Queuing

● Anti-Virus Protection

● Anti DDoS Protection

● Advanced VPN Encryption Technologies

● Easy to administer integrated VOIP w/Call

Recording, IVR and VoiceMail capabilty

● Network File Storage

● Automated Network Backup

● 24/7 Monitoring and Alerting

● Automatic Updates and In Place Firmware

Upgrades

● Cloud-Hosted EquiiOS Available

(Ask about our Virtual Integrated Network Appliance!)

Much more!

Page 30: Equiinet discussion of cyber threat landscape final 2016

☑ CHECK-LIST

Page 31: Equiinet discussion of cyber threat landscape final 2016

THANK YOU

ARE YOU PREPARED?

⎕ Do your employees bring their own devices?

- Are they allowed to plug them into the network?

⎕ Do you have remote workers? (Road Warriors)

- Do they use strongly encrypted VPN technologies?

- Do they use secure voice communication?

⎕ Do you have a data backup policy?

- How often do you review these policies?

⎕ Do you know who to contact in the case of a breach

or imminent threat?

⎕ Do you have a Firewall installed at your location?

- Do you know who manages that firewall?

⎕ Do you have anti-virus and anti-malware software

installed on your PCs?

- Is that software up to date?

⎕ Does your business have an Internet usage

policy?

- How is that policy enforced?

Page 32: Equiinet discussion of cyber threat landscape final 2016

QUESTIONS

Page 33: Equiinet discussion of cyber threat landscape final 2016

© 2016 Equiinet, Inc. All rights reserved. 2764 N Green Valley Pkwy. Henderson, NV 89014

THANK YOU