More than 4.2 billion records were stolen last year in 4,149 confirmed breaches. Although media focused on big brands like Yahoo and the DNC, we cannot assume that hackers have missed smaller businesses on their radar. Indusface brings you the biggest numbers and learnings from the cyberthreats last year.
- Startups and small businesses are at greater risk.
Although mishaps in big companies are often reported on a large scale, smaller companies are at much bigger risks. According to the Osterman Research report, close to 71% SMEs have suffered some kind of security breach in the last one year. Since these breaches go unreported, other smaller companies neglect cybersecurity, too. Shockingly, Cisco’s Annual Security Report 2016 says that 22% of businesses with fewer than 500 employees do not have an executive with direct responsibility and accountability for security.
- Ransom attacks will grow.
Money is the biggest motivator behind cyberattacks. Stealing data or stopping web services is the best way to ensure that admins pay to protect their market reputation. In 2016, many companies like TalkTalk (£80K in Bitcoins ransom demanded) were breached. In the State of Security survey,....
Author
- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
- LiveSeptember 5, 2024"40 Steps" Satellite Security - Registration for LIVE WORKSHOP IS NOW ON!
- LiveAugust 21, 2024"40 Steps" Game Hacking - Registration for LIVE WORKSHOP IS NOW ON!
- BlogDecember 13, 2022What are the Common Security Weaknesses of Cloud Based Networks?
- BlogOctober 12, 2022Vulnerability management with Wazuh open source XDR