1 Background The Interdisciplinary Research Centre in Cyber Security at the University of Kent in Canterbury recently launched a second online survey 1 in order to get a better picture of the prevalence and impact of cybercrime victimisation, cyber security practices, and risks as seen by a sample of the UK population. Executive Summary The survey was composed of 8 questions that covered a wide range of cybercrime and cyber security related issues, and was carried out between the 22 nd and the 24 th of January, A total of 1,502 individuals from throughout the UK responded to the survey, of the 968 who indicated their gender, 407 were male and 561 were female. Ages were recorded in bands from 18 to 65+. Participants were asked about their experiences of cybercrime and cyber security practices over the last 12 months between January 2013 and January All eight questions were answered by each participant. 1. The majority of respondents felt at risk of being a victim of online crime over the last twelve months (67.7%), representing 926 individuals from the total sample (n=1,502). However, a significant proportion declared not feeling any risk at all (6.6%), just under 100 people, suggesting more work needs to be done in terms of campaigns for raising public awareness and education over the threat presented by online crime. 1 Through Google Consumer Surveys. More details of the service at
2 2. Over a quarter of respondents reported being a victim of a cyber-dependent crime over the last twelve months (26%), representing around 390 individuals, and a proportion of them experienced multiple incidents. These findings suggest a relatively high prevalence, despite the wide availability of security software and well-known best practices. 3. Eleven percent of respondents affirmed being a victim of a cyber-enabled crime over the last twelve months, representing 165 individuals from the total sample (n=1,502). Worryingly, of these, 102 individuals reported being a victim of either online harassment/bullying (n=43), stalking (n=34) or online sexual offenses (n=25). Despite the seemingly small numbers, these figures appear comparatively high in relation to traditional crime rates (CSEW, 2013) and indicate the necessity for further research in this area. 4. Whilst the vast majority of respondents did not report any significant impact as a result of being a victim of cybercrime, psychological and/or emotional consequences of victimisation were the most common response given, selected by 82 individuals from the total sample (n=1,502). Very little research has been dedicated to the impact of cybercrime in the United Kingdom, in particular beyond financial losses. These findings suggest there are other noticeable effects from online crime, which require further research in order to understand how best to address the needs of victims. 5. Of those respondents who reported a cybercrime, the majority did it to a financial institution (5%) or their Internet Service Provider (3.8%). The least common avenue for reporting a crime was through official channels, such as Action Fraud (2.7%), and law enforcement agencies (3.5%). These troubling findings indicate a low level of awareness on how and whom to report experiences of cybercrime to, highlighting the sore need for increased awareness among the general population covering the different options for properly reporting a cybercrime. 6. Just under 13% of those respondents who did not report being a victim of cybercrime, chose not to because they thought it was a waste of their time or they did not know where to report the crime. These results suggest a lack of awareness of available support from law enforcement agencies.
3 7. The prevalence of the Cryptolocker ransomware (3.4%) seems much higher than expected. The proportion of Cryptolocker victims that claim to have agreed to pay the ransom to recover their files (41%) seems to be much larger than expected (3% was conjectured by Symantec, 0.4% by Dell SecureWorks). Detailed Main Findings In the following sections, we outline the preliminary findings from the survey by discussing the results of each of the questions. The full findings will be written up for publication in a peer reviewed journal in the coming months. Q1. To what extent do you feel at risk from cybercrime? The majority of respondents identified feeling at risk of being a victim of an online crime (67.7%). Of these, 41.1% picked I feel at risk, I am careful when online, 20.9% picked I feel at risk, I m very vigilant online and 5.7% answered I feel the risk is unbearably high, as shown in Figure 1. Figure 1. Answers to Q1: To what extent do you feel at risk from cybercrime? Surprisingly, around 6.6% of the respondents surveyed do not feel at risk online and have the impression they will not ever become a cybercrime victim, suggesting there is a lack of public awareness around the threat presented by cybercrime. More cyber security education and awareness would do these users well, as they are in all likelihood the ones that will engage in
4 the more risky online practices and easy targets for cyber criminals. There are notably more men than women in this category: 10.6% vs. 4.4%. Q2. Over the last 12 months, have you been a victim of a successful? This question accepted multiple answers as outlined in Figure 2 and focused on cyberdependent crimes (e.g. hacking, viruses etc.). Over a quarter of respondents had been a victim of at least one of the listed cyber-dependent attacks over the last year (26%). Interestingly, a number of participants reported being victims of more than one cyber-attack. These findings suggest a relatively high prevalence of cyber-dependent crimes being committed, despite the wide availability of cyber security software and common industry practices. That offers a quite worrying perspective over the current threat that cyber-attacks represent for the average individual, especially serious and damaging ones like compromised accounts, which is often the gateway to all online accounts, and online banking. We found a relatively high number of people affected by an online bank attack (3.9%) which could be potentially very costly. This data is shown in greater detail in Figure 2. Figure 2. Answers to Q2: Over the last 12 months, have you been a victim of a successful?
5 Q3. Over the last 12 months, have you been a victim of? This question accepted multiple answers, as outlined in Figure 3 and focused on cyber-enabled crimes (e.g. fraud and theft, harassment/bullying, online stalking and online sexual offending). Just over four percent had recently been victims of online fraud or theft, very much in line with the 3.9% found in Q2 to have suffered an online banking attack. Harassment and bullying seem to be quite common also, with around 2.9% of the respondents claiming they have been victimised in the last 12 months. A similar percentage (2.3%) were victims of online stalking. Approximately 1.7% had recently been victims of some sort of online sexual offence. Worryingly a number of respondents had been victims of multiple cyberenabled offences over the last year. Despite the seemingly small numbers, these figures appear comparatively high compared to traditional crime rates (CSEW, 2013) and indicate the necessity for further research in this area. A diagram with the results can be seen in Figure 3. Figure 3. Answers to Q3: Over the last 12 months, have you been a victim of?
6 Q4. What were the impacts from the online crime(s) you experienced over the last 12 months? Also multiple answers were possible for this question, where we tried to investigate the various impacts felt by the victims of cybercrime. The 87.4% who have felt no impact at all from cybercrime is substantially higher than the 74% on Q2, so it includes a significant number of cybercrime victims suffering no significant impact. The most frequent type of impact is of psychological or emotional nature (5.5%), closely followed by a relatively mild financial impact of less than 1,000 (around 4.7%). Loss of reputation was next (2.4%), this may relate to the incidence of harassment/bullying (2.9%) in Q3 but also to social media account takeovers. Finally, 1% reported some sort of physical impact as a result of being a victim of cybercrime. Interestingly, around 1.9% of the respondents declared relatively heavy losses over 1,000 over the last 12 months. Dividing the financial loss in this way, instead of allowing for an open question was intentional, to avoid common biases expressed in recent publications 2. Although it is not possible to reliably extrapolate a global amount lost from the data, we can certainly conclude that having 1.9% of the respondents claiming to have lost more than 1,000 and 4.7% more than zero but less than 1,000 implies heavy losses for individuals across the country as a result of cybercrime. It is worth noting that 1.2% of the respondents ticked both of the financial possibilities (under 1,000 and over 1,000). Whether this was due to error, exaggeration, or in reference to multiple incidents within the same 12 month period, we don t know; in any case we believe it is a very small percentage that doesn t affect the overall results or conclusions. Whilst financial losses and loss of reputation are probably the most expected consequences of online crime, the survey suggests there are other important impacts on individuals (e.g. psychological, emotional and physical), which existing literature has paid little attention to so far and thus requires much closer attention in future research. 2 Sex, Lies and Cyber-Crime Surveys, by Dinei Florencio & Cormac Herley, in Bruce Schneier (ed.): Economics of Information Security and Privacy III, Springer
7 Figure 4. Answers to Q4: What were the impacts from the online crime(s) you experienced over the last 12 months? Q5. Who did you report the cybercrime to? Again, multiple answers were allowed to this question, as it is possible for a crime to be reported to multiple parties (e.g. bank and law enforcement). Most crimes were reported to the banks and other financial services (5%), which is hardly surprising as the large majority of them would likely involve illegally accessing the victim s bank accounts, transferring money, etc. and it seems natural to contact them first to try to stop these operations from being carried out. More surprising is that in second position came the victim s Internet Service Provider with 3.8%. One of the official avenues for reporting cybercrime, (e.g. Action Fraud) came last, with 2.7%, suggesting that awareness on how to properly report cybercrime is worryingly low. Other law enforcement was picked by 3.5%, and the victim s computer security provider (antivirus vendor, etc.) by 3.1%, as shown in Figure 5. We aim to take a closer look to how this relates to successful virus attacks (Q2) and antivirus usage (Q8), and how many of the respondents choosing None of the above did experience a cybercrime of some sort this
8 should be well over 10% already based on Q2 results. Figure 5. Answers to Q5: Who did you report the cybercrime to? Q6. If you did not report a cybercrime, what was your main reason? This question aimed to gain an understanding of why individuals may fail to report a cybercrime. Some of the recent press discussion on overall crime figures referred to the reporting rate of cybercrime. The most relevant finding (see Figure 6) probably was to find a relatively high percentage of people thinking that reporting was a waste of time (7.6% overall, but especially men at 9.6%) or not knowing who or how to report it (5.1%). These results suggest a lack of awareness of available support from law enforcement agencies regarding cybercrime and what they could do to get help. More information and investment in awareness campaigns could be a way to address this in the future.
9 Figure 6. Answers to Q6: If you did not report a cybercrime, what was your main reason? Q7. Have you ever been affected by CryptoLocker, or other similar malware or virus demanding a ransom? In this question, we tried to ascertain the prevalence of a recent and quite dangerous strand of malware called CryptoLocker 3, which encrypts data files in victim s systems, and asks for a ransom to recover them. General knowledge about the prevalence and success of this (and similar) ransomware is very limited, so a better understanding of how many people were infected and paid, and whether they were able to recover their files is interesting and quite a hot topic at the present time. The findings of this question are quite remarkable and defy previous estimations of prevalence and success by a large margin, sometimes tenfold. Of course we have to be cautious about the validity of the results shown here, for a number of reasons like the size and the bias of the sampled population and possibly others. Taking that (and its reflection in the relatively wide confidence intervals on some of these answers) into account, some figures are still remarkably high when compared with previous estimates. It is surprising that approx. 9.7% of the respondents claim to have been victims of some sort of ransomware. This figure is at least twice as high as the one we were expecting, judging from the scarce and quite speculative previous literature. Most of the ransomware victims seemed to have chosen not to pay the ransom, but a very high percentage of them indeed complied and sent the money to the cyber criminals. This percentage seems to be around 41% for 3 National Crime Agency (NCA) alert - Mass ransomware spamming event targeting UK computer users. 15 Nov
10 CryptoLocker and approx. 30% for other strands of ransomware (Icepol/Reveton, and many others). This is at least 10 times more than the last previous estimation by Symantec 4 of around a 3% of paying victims (a previous one by the Dell SecureWorks CTU research team 5 put this figure at 0.4%). If this were true and other researchers findings corroborate this figure in the future, it shows a lack of success of the multiple public calls discouraging victims to pay the ransom, and would explain the enormous success of this particular ransomware (from the criminals point of view, of course) and why copycats are rapidly emerging. Finally, both the prevalence of Cryptolocker (at around 3.4%) and that of other ransomware (6.4%) are much higher than expected. Figure 7a. Answers of No, never to Q7, sorted by sex A curious insight (shown in Figure 7a.) into this question is that it seems that women are less affected by this kind of malware, as they significantly picked the answer No, never more than men. This may or may not be a particularity of CryptoLocker and other ransomware. In fact, we have reasons to believe this would most likely happen with any other malware infection as women in general probably engage in less risky practices, and use security measures more frequently. Scotland seems to have been less affected by these ransomware strands than the UK average. For more on this, see Figure 7b and further discussion on the results of Q Ferguson, D. (2013, October 18) CryptoLocker Attacks That Hold Your Computer to Ransom. Retrieved Feb. 7, 2014, from
11 Figure 7b. Answers to Q7: Have you even been affected by CryptoLocker, or other similar malware or virus demanding a ransom? Q8. What measures have you taken to improve your online security over the last 12 months? In this question, we aimed at understanding better what security measures respondents had put in place to increase their security over the last year. Multiple answers were again allowed to this question, as multiple measures can be used simultaneously. Most used an up-to-date antivirus software (48.5%) or a firewall (36.2%) and a sizeable proportion used different passwords for different sites (33.8%) or changed them regularly (28.6%). It is particularly interesting that 8.3% decided to reduce their online banking and shopping activity in response to the threat of cybercrime. Worryingly enough, a 28.2% of the respondents did not engage in any of these security
12 practices. Again, perhaps a case for furthering wider education in the matter. The direct analysis of Q8 results by age, gender, and region led to a number of interesting insights. For example, it seems that the usage of antivirus steadily increases with age in the UK: This, on the other hand, is less clear over the use of a firewall (where 65+ seem less inclined to use it than people in the band) and this or a similar pattern is common to other security measures like changing passwords regularly. Additionally, and across almost all categories, it seems women take less risk and adopt better security practices than men. As an example, let s see what happens with regularly changing passwords: But this also happens in the usage of antivirus software, firewalls, password management, and even with reducing shopping and banking online.
13 It also looks like Scotland has the best security practices across all of the UK. This is clear in a number of cases, but let s focus on just two examples: The same holds for Scotland on the use of up to date virus protection, etc. Cautionary Note The relatively small size of this survey means that any extrapolation from these figures to total numbers of British citizens affected, total amounts of money lost, etc. are unlikely to represent the true national picture and should be approached extremely cautiously and conservatively. Authors Dr. Julio Hernandez-Castro and Dr. Eerke Boiten, of the School of Computing of the University of Kent, are the main authors of this survey and the accompanying documentation.
14 Magali Barnoux, of the Kent Faculty of Psychology, also contributed. The three are with the Interdisciplinary Research Center in Cyber Security. For more info and media inquiries please contact Katie Scoggins Press Officer, University of Kent
Tackling Cyber Crime in the UK Andy Archibald Deputy Director National Cyber Crime Unit Cybercrime Facts Cost of Cybercrime Reports of cyber crime to Action Fraud increase d by 30% 229 median number of
Cyber crime: a review of the evidence Samantha Dowling Cyber Crime Research Home Office Science Dec 2013 1 Purpose of the evidence review Set in context of the National Cyber Security Strategy (2011) and
National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In
2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security
You wouldn t leave the door to your premises open at night. So why risk doing the same with your network? Most businesses know the importance of installing antivirus products on their PCs to securely protect
Cyber crime: A review of the evidence Research Report 75 Chapter 4: Improving the cyber crime evidence base Dr. Mike McGuire (University of Surrey) and Samantha Dowling (Home Office Science) October 2013
RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123 Cybersecurity: A Growing Concern for Small Businesses Copyright Materials This presentation is protected by US and International Copyright
on the coverage of crime statistics 23 January 2014 1 Introduction This discussion has been produced in response to questions about the coverage of official statistics on crime, in particular, the extent
Global IT Security Risks June 17, 2011 Kaspersky Lab leverages the leading expertise in IT security risks, malware and vulnerabilities to protect its customers in the best possible way. To ensure the most
NetSafe/ AVG New Zealand Contents Page 1. Objectives and Methodology 3 2. Summary and Conclusions 6 3. Main Findings 8 Online security a serious issue 9 Concern about online challenges 11 Most important
Identity Theft CHRISTOS TOPAKAS Head of Group IT Security and Control Office Agenda Identity Theft Threats and Techniques Identity Theft Definition and Facts Identity Theft & Financial Institutions Prevention
Cyber crime in business: The facts Bedfordshire Police has launched a new unit dedicated to investigating cyber crime the Cyber Hub. It exists to prosecute offenders and protect the public, including businesses.
Cybersecurity: A Growing Concern for All Businesses RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 RLI Design Professionals is a Registered Provider with The American
The 7 Most Cricitcal I.T. Security Protections Every Business Must Have in Place Now to Protect Themselves from Cybercrime, Data Breaches, and Hacker Attacks Cybercrime is at an all-time high, and hackers
How to protect yourself from fraudulent wire requests and ransomware attacks. As technology continues to advance and provide additional ways for consumers to manage their finances, cyber criminals create
The SMB Cyber Security Survival Guide Stephen Cobb, CISSP Security Evangelist The challenge A data security breach can put a business out of business or create serious unbudgeted costs To survive in today
TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME Haya Fetais & Mohammed Shabana Saint Leo University COM- 510 November 23, 2014 Introduction Globalization and technological developments have infiltrated
Presented By: Corporate Security Information Security Treasury Management Is Your Business Prepared for a Cyber Incident? It s not a matter of if, it s a matter of when Cyber Attacks are on the Rise; Physical
SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.
Defeating cybercriminals Protecting online banking clients in a rapidly evolving online environment The threat As the pace of technological change accelerates, so does the resourcefulness and ingenuity
ADDRESS 2 Thomas More Square London E1W 1YN WEBSITE www.financialfraudaction.org.uk DIRECT LINE 020 3217 8436 NEWS RELEASE EMAIL email@example.com Deception scams drive increase in financial fraud
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
NORTON CYBERSECURITY INSIGHTS REPORT Get informed about the truths of online crime and the personal impact it has on you Table of Contents > INTRODUCTION... 3 > WE KNOW THE RISK FOR ONLINE CRIME IS HIGH...
Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs
Special Eurobarometer 423 CYBER SECURITY SUMMARY Fieldwork: October 2014 Publication: February 2015 This survey has been requested by the European Commission, Directorate-General for Home Affairs and co-ordinated
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
DOMESTIC VIOLENCE AND THE WORKPLACE A TUC SURVEY REPORT THE BACKGROUND TO THE SURVEY Domestic violence may happen behind closed doors but it has far reaching consequences and is known to have an impact
CYBER SECURITY STRATEGY AN OVERVIEW Commonwealth of Australia 2009 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without
2011 NATIONAL SMALL BUSINESS STUDY The National Cyber Security Alliance has conducted a new study with Symantec to analyze cyber security practices, behaviors and perceptions of small businesses throughout
cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends
CYBER SECURITY ADVISORY SERVICES Governance Risk & Compliance Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts The Financial Services Industry at Crossroads: Where to From Here? WELCOME What
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Corporate Security in 2016. A QA Report Study Highlights According to ThreatMetrix, businesses in the UK are at greater risk of cybercrime than any other country in the world. In a recent survey carried
CSM-ACE 2014 Cyber Threat Intelligence Driven Environments Presented by James Calder Client Services Manager, Singapore 1 CONTENTS Digital criminality Intelligence-led security Shylock case study Making
SECURITY REQUIREMENTS IN SOCIAL NETWORKS Mehdi Sagheb-Tehrani (PhD), Columbus State University, firstname.lastname@example.org Arbi Ghazarian (PhD), Arizona State University, Arbi.Ghazarian@asu.edu ABSTRACT
Finding a Cure for Medical Identity Theft A look at the rise of medical identity theft and what small healthcare organizations are doing to address threats October 2014 www.csid.com TABLE OF CONTENTS SUMMARY
Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security
Norton Online Reputation Report: Why Millennials should manage their online footprint France May 2016 Methodology A quantitative survey was conducted online among 3,038 mobile users aged 18-34 years who
PCI White Paper Series Compliance driven security Table of contents Compliance driven security... 3 The threat... 3 The solution... 3 Why comply?... 3 The threat... 3 Benefits... 3 Efficiencies... 4 Meeting
CYBERSECURITY: Is Your Business Ready? Cybersecurity: Is your business ready? Cyber risk is just like any other corporate risk and it must be managed from the top. An organization will spend time monitoring
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
State of the Web 2015: Vulnerability Report March 2015 Motivation In February 2015, security researchers http://www.isightpartners.com/2015/02/codoso/ reported that Forbes.com had been hacked. The duration
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
Agenda Item No. 5 COMMUNITY OUTCOMES MEETING SUBJECT: CYBER CRIME 4 August 2015 Report of the Chief Constable PURPOSE OF THE REPORT 1. This report outlines the Force s current position in relation to the
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a
National Cybersecurity Awareness Campaign About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security with creating an ongoing
400,000000 Almost 400 million people 1 fall victim to cybercrime every year. A common way for criminals to attack people is via websites, unfortunately this includes legitimate sites that have been hacked
FP7-SEC-2013.2.5-2 Grant Agreement Number 607775 Collaborative Project E-CRIME The economic impacts of cyber crime D2.2 Executive summary and brief: Cyber crime inventory and networks in non-ict sectors
FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5,500 companies in 26 countries around the world
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY Mark Villinski @markvillinski Why do we have to educate employees about cybersecurity? 2014 Corporate Threats Survey 94% of business s suffered one
SENIORS ONLINE SECURITY Seniors Online Security Five Distinct Areas Computer security Identity crime Social networking Fraudulent emails Internet banking 1 Computer security 2 There are several ways that
WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON THE JUDICIARY HEARING ON PRIVACY IN THE DIGITAL AGE: PREVENTING DATA BREACHES AND COMBATING CYBERCRIME FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN EXECUTIVE
Global IT Security Risks: 2012 Kaspersky Lab is a leading developer of secure content and threat management solutions and was recently named a Leader in the Gartner Magic Quadrant for Endpoint Protection
CYBER CRIME & SECURITY SURVEY REPORT 2012_ Acknowledgements CERT Australia and the CIS would like to acknowledge the following contributors to the production of this report: CERT Australia s partner organisations
CYBER CRIME & SECURITY SURVEY REPORT 2012_ ACKNOWLEDGEMENTS CERT Australia and the CIS would like to acknowledge the following contributors to the production of this report: CERT Australia s partner organisations
WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners
Making Sense of Cyber Insurance: A Guide for SMEs abi.org.uk @BritishInsurers 2 abi.org.uk Contents Introduction 4 Six Key Areas to Look Out For in Cyber Insurance Policies 5 Potential Exclusions to Look
Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There
CONSUMER SECURITY RISKS SURVEY 2014: MULTI-DEVICE THREATS IN A MULTI-DEVICE WORLD July, 2014 Contents Introduction... 2 Main findings... 3 Methodology... 4 Section 1. The use of different devices to access
10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
10 December, 2014 Identifying Cyber Risks and How they Impact Your Business David Bateman, Partner, K&L Gates, Seattle Sasi-Kanth Mallela, Special Counsel, K&L Gates, London Copyright 2013 by K&L Gates
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
Social Media Status Update Messages October 2012 is National Cyber Security Awareness Month. Join the social media community and raise awareness about online safety and security. Use the following messages
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
Data Breaches, Identity Theft, and Employees Joining the Dots and Dispelling the Myths What you ll learn Data Breaches + identity theft + employees Data Breaches or Data Donations? Data Breaches + Identity
AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for an automated penetration testing product and demonstrate
Digital Consumer s Online Trends and Risks Modern consumers live a full-scale digital life. Their virtual assets like personal photos and videos, work documents, passwords to access social networking and
CSG & Cyberoam Endpoint Data Protection Ubiquitous USBs - Leaving Millions on the Table Contents USBs Making Data Movement Easy Yet Leaky 3 Exposing Endpoints to the Wild. 3 Data Breach a Very Expensive
Cyber Security: Are You Prepared? This briefing provides a high-level overview of the cyber security issues that businesses should be aware of. You should talk to a lawyer and an IT specialist for a complete
2011 State of Security Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: Cybersecurity is important to business... 8 Finding 2: The drivers of security are changing... 10 Finding
DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5500 companies in 26 countries around the world
Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
Electronic Health Information at Risk: A Study of IT Practitioners Sponsored by LogLogic Conducted by Ponemon Institute LLC October 15, 2009 Ponemon Institute Research Report Executive summary Electronic
Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.
Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference Christopher T. Van Marter Senior Deputy Prosecuting Attorney Chief White Collar Crime Unit Department of the Prosecuting Attorney
SYMANTEC 2010 SMB INFORMATION PROTECTION SURVEY Symantec 2010 SMB Information Protection Survey Global Data June 2010 CONTENTS Executive Summary...3 Methodology...4 Finding 1: SMBs serious about information