Presentation is loading. Please wait.

Presentation is loading. Please wait.

[Internal Use] for Check Point employees​

Similar presentations


Presentation on theme: "[Internal Use] for Check Point employees​"— Presentation transcript:

1 [Internal Use] for Check Point employees​
Cybercrime Security Threats Facing Your Business  [Internal Use] for Check Point employees​

2 SMB is an organization with 500 users or less
Do not have a dedicated Security person 81% 86% SMB are organizations with 500 users or less Over 81% do not have a dedicated IT person Over 86% do not have a dedicated Security person Do not have a dedicated IT person ©2017 Check Point Software Technologies Ltd.  [Protected] Distribution or modification is subject to approval ​

3 83% 0.7% Attacks on SMB resulted in a confirmed breach
Attacks on large enterprises resulted in a confirmed breach Attack success ratio on SMBs is 83% compared to 0.7% with large enterprises (source: DBIR 2016) Source: Verizon DBIR 2016 ©2017 Check Point Software Technologies Ltd.  [Protected] Distribution or modification is subject to approval ​

4 $32,000 Average hacking cost on a small business
Source: source: National Small Business Association, 2016 ©2017 Check Point Software Technologies Ltd.  [Protected] Distribution or modification is subject to approval ​

5 Understanding Why Ransomware is on the Rise
It is easier for hackers to execute than other campaigns The Money Factors Less Technical Obstacles We all know that infections will happen. According to the Verizon breach investigation last year, they looked at almost 80,000 incidents, of those over 2,000 of them were confirmed to involve data breaches. What do you do to efficiently respond to these attacks? Social Engineering Exploit Kits Broad Audience without customization or localization Time to money is sooner Bitcoin reduces risk on collection, and eliminates reversals Simplified Attacks, some without Command & Control Onus is on the victim to pay, not on hacker to exfiltrate Source: Verizon: 2015 Data Breach Investigations Report  [Protected] Non-confidential content​

6 Best Practices for Protection
Blocking / Containment are crucial Backup your data, just in case So, what can you do? First it is critical to block these attacks up front, both to prevent encryption, and to prevent spread of the malware to other systems. It is good practice to step up your backup procedures to make sure if you are attacked, you can restore without paying, but also because even if you are willing to pay it is possible the hackers may have bugs in their software and not be able to recover your files. This is not after all, commercial quality, fully-QA-ed code! And if you do see an infection, make sure you learn from that, so you can prevent more users from suffering similar consequences. In many cases the best approach is educating users on what the threats look like, and which ones may be active in your organization. Beware new variants that encrypt off-line Prevent spread to more users, or network storage Not only to avoid paying Also because they may have bugs To avoid additional or reinfections Educate users Research your incidents  [Protected] Non-confidential content​

7 Threats 15,000 of our SMB customers face every day
Phishing most common attack vector Kelihos & Zeus Most common prevented malware YouTube Consumes x4 Bandwidth than any other app Source: Data collected from over 15,000 small business managed in Check Point Cloud SMP during December 2016 SMBs experience the same attacks as large enterprises Yet, they do not have the tools, skills or budget to address this problem Example: Target attack started with an SMB SMBs Face The Same Threats As Large Enterprises source: Check Point SMB Cloud Management, December 2016 ©2017 Check Point Software Technologies Ltd.  [Protected] Distribution or modification is subject to approval ​

8 2016 - PHISHING IS EVERYWHERE
Over 90% APT ATTACKS INVOLVE PHISING CSO Magazine, 2016 Up to45% SUCCESS RATE OF CREDENTIAL THEFT Google hijacking study, 2014  [Restricted] for designated teams ​

9 [Internal Use] for Check Point employees​
Considerations & Project Goals -Generate additional revenue from tasks currently performed Pro Bono/Gratis -Create a managed service solution from existing work force -Single pane of glass management console for appliances -Pricing built to provide a hardware ROI as close as possible to 1 year -Minimal or no upfront cost to the customer -Provide continued tangible value to the customer with weekly reports  [Internal Use] for Check Point employees​

10 [Protected] Non-confidential content

11 [Protected] Non-confidential content

12 [Internal Use] for Check Point employees​
Conclusions: -PTCI has over 1,500 ILEC/CLEC Business Broadband Customers -Customer education is key: Lunch & Learns or Try & Buy -Remember that “Firewall Services” are covered under ERATE Category 2 -Launched June 1st. We currently have 15 Managed Firewall customers -C.Y.A = Make sure you services agreement contract is thorough -Don’t forget businesses just need simple router/wifi access -Managed Services are not limited to your customers or your serving areas  [Internal Use] for Check Point employees​


Download ppt "[Internal Use] for Check Point employees​"

Similar presentations


Ads by Google