Cisco 2014 Annual Security Report
-
Upload
cisco-business-insights -
Category
Technology
-
view
13.695 -
download
0
Transcript of Cisco 2014 Annual Security Report
![Page 1: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/1.jpg)
1
Cisco 2014 Annual Security Report
#CiscoSecurity
![Page 2: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/2.jpg)
2
The 2014 Cisco Annual Security Report highlights the most important security trends of the year and provides tips and guidance to keep enterprise technology environments more secure.
#CiscoSecurity
![Page 3: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/3.jpg)
3
Cisco stays ahead of and shares the latest threats by using real-time threat intelligence from Cisco Security Intelligence Operations (SIO), and this year’s report also incorporates Sourcefire telemetry.
#CiscoSecurity
![Page 4: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/4.jpg)
4
Cisco SIO is the world’s largest cloud-based security ecosystem, using more than 75 terabits of live data feeds from deployed Cisco email, web, firewall and intrusion prevention system (IPS) solutions.
#CiscoSecurity
![Page 5: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/5.jpg)
5
Cisco 2014 Annual Security Report Highlights
#CiscoSecurity
![Page 6: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/6.jpg)
6
Overall vulnerabilities and threats reached the highest level since initial tracking began in May 2000.
#CiscoSecurity
![Page 7: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/7.jpg)
7
There is a shortage of more than a million security professionals across the globe in 2014.
#CiscoSecurity
![Page 8: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/8.jpg)
8
100% of a sample of 30 of the world’s largest multinational company networks generated visitor traffic to Web sites that host malware.
#CiscoSecurity
![Page 9: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/9.jpg)
9
Distributed Denial of Service (DDoS) attacks have increased in both volume and severity.
#CiscoSecurity
![Page 10: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/10.jpg)
10
Multipurpose Trojans counted as the most frequently encountered web-delivered malware, at 27% of total encounters in 2013.
#CiscoSecurity
![Page 11: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/11.jpg)
11
Java continues to be the most frequently exploited programming language targeted by online criminals.
#CiscoSecurity
![Page 12: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/12.jpg)
12
99% of all mobile malware targeted Android devices.
#CiscoSecurity
![Page 13: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/13.jpg)
13
In 2012 and 2013, there was remarkable growth in malware encounters for the agriculture and mining industry—formerly a relatively low-risk sector.
#CiscoSecurity
![Page 14: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/14.jpg)
14
Reactions to the 2014 Cisco Annual Security Report
#CiscoSecurity
![Page 15: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/15.jpg)
15
Instead of having healthy caution about offering access to networks and infrastructure, users are placing too much trust in the systems designed to protect them.
Source: David Roe, CSM Wire
#CiscoSecurity
![Page 16: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/16.jpg)
16
In short, while defense tools are improving, the lack of skilled security professionals across all of the security practice areas is impacting organizations’ abilities to monitor and secure networks. Source: Peter Bernstein, TechZone360.
#CiscoSecurity
![Page 17: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/17.jpg)
17
If technologies like cloud computing and the growth in the use of mobile technologies are creating a wider landscape for hackers to work on, then trust is the open door letting hackers into systems.
Source: David Roe, CSM Wire
#CiscoSecurity
![Page 18: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/18.jpg)
18
New classes of devices and new infrastructure architectures offer attackers opportunities to exploit unanticipated weaknesses and inadequately defended assets.
Source: Peter Bernstein, TechZone360
#CiscoSecurity
![Page 19: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/19.jpg)
19
99% of mobile malware is aimed at the Android operating system (OS), and 71% of all malicious websites target Google’s mobile OS. Source: Chris Merriman, The Inquirer
#CiscoSecurity
![Page 20: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/20.jpg)
20
Cybercriminals have learned that harnessing the power of Internet infrastructure yields far more benefits than simply gaining access to individual computers or devices.
Source: CIOL Bureau
#CiscoSecurity
![Page 21: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/21.jpg)
21
Distributed denial of service (DDoS) attacks- which disrupt traffic to and from targeted websites and can paralyze ISPs- have increased in both volume and severity.
Source: Peter Bernstein, TechZone360
#CiscoSecurity
![Page 22: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/22.jpg)
22
By targeting Internet infrastructure, attackers undermine trust in everything connected to or enabled by it.
Source: CIOL Bureau
#CiscoSecurity
![Page 23: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/23.jpg)
23
Download to learn more:
Cisco 2014 Annual Security Report
#CiscoSecurity
![Page 24: Cisco 2014 Annual Security Report](https://reader036.fdocuments.in/reader036/viewer/2022062420/55d50fd9bb61eb682e8b45c8/html5/thumbnails/24.jpg)
24
Find out how to align your IT strategy with the future
Go ExecutivePerspectives
#CiscoSecurity
@CiscoSecurity