IF YOU’RE NOT ALARMED BY THE RISKS

You've been misinformed.

New technology, New Threats

After decades in cyber security for the Australian Government, we’re no stranger to the level of risks involved from cyber-attacks. In recent years, however, the attacks being made on commercial business has reached the same level of sophistication.

Make no mistake.

After decades in cyber security for the Australian Government, we’re no stranger to the level of risks involved from cyber-attacks. In recent years, however, the attacks being made on commercial business has reached the same level of sophistication.


They don’t care where they get their information.

National security or customer database, government department 
or financial transactions – it’s all data, it’s valuable, and it’s a target.

Most organisations don’t know they’re coming.

They’re organised, sophisticated, intelligent, and their most powerful weapon is stealth.

CYBER RISK STATISTICS

Threats

AsiaPacific companies receive a cyber threat 
every 10 seconds* and only 50% are being investigated**.

Profits

$1.3 Trillion USD was stolen in 2018 alone***. If ‘cyber-crime’ were a nation state, 
it would have the 15th largest GDP in the world, coming in right behind Australia.

Escalation

1.9 billion records were compromised in the US in the first half of 2017, 
and if the trend continues, it’s heading for a 175% increase in one year alone****

*Cisco Asia Pacific Security Benchmark 2018 | ****Breach Level Index Report 2017

Where are the threats coming from?

Organised crime syndicates


Illegal drug trafficking brought in $500 billion USD worldwide in 2018* , 
which is only 38% of the amount generated by cyber-crime during the same time. In other words, it’s a very profitable enterprise, and it’s driven by organised crime syndicates on a massive scale. Although there are still lone wolf operators out there, 
they’re comparatively insignificant in today’s environment.

Internal data breaches


Whether it’s a disgruntled employee, a simple mistake or an opportunistic 
theft, many of the breaches organisations experience come from within.


How do they get past the firewall and anti-virus?

Considering they’re operating illegally, hackers are 
surprisingly open about how they go about their business.

- 70% can breach any market sector in 10 – 15 hours*

- 77% say they’re rarely identified a security team* *Nuix Black Report 2018

The question that might be more appropriate, 
is when will they get past the firewalls.

Here are some other potential vulnerabilities.

Lack of Education


*84% of attempted attacks are email phishing, and 42% of successful attacks are in 
the form of phishing and social engineering. Employee education can address this.

Access Error


*62% of business users report they have access to data they shouldn’t have. This fact combined with a disgruntled employee, can easilty be the source of a breach.

Foreign Devices


*73% of organisations follow Bring Your Own Device policies, and if an unsecured iPhone connects to your system, the network can be breached. Once again awareness, and software can resolve this.

Remote Working 


*97% of businesses have employees who work remotely. Whether it’s out on the road, or working from home, systems are less secure when they’re outside your controlled environment. This can also be addressed.

Where are you being attacked from?

Security camera password breach

Low cost security cameras were the source of a breach in 2018, as the passwords were 
all set to default by the manufacturer, and then connected to numerous networks and systems. The Internet of Things is proving to be a major attack vector.

Will AI and Machine Learning help?

Artificial intelligence may protect you from the some commodity Malware programs out there, however that’s only 53% of all attacks nowadays*. In short, AI will not prevent a breach of confidential customer information, data loss, loss of reputation, potential legal action and even jail time.

What can I do about it?

A determined and focussed attack will eventually breach any network. 
You need to determine what you’re going to do when it happens.

Contact us, or call us and we’ll make a plan to protect you and your systems.

.svg" type="media_type"