SlideShare a Scribd company logo
The Cost of Inactivity
As the cost and likelihood of a breach grows you can’t afford
“good enough” protection before, during, AND after an attack.
Organizations Are Not Able To Detect A Breach
In A Timely Manner
2+ Years to Discover
the Breach
33% 55%
Unable to Determine the
Cause of the Breach
Top 3 causes of a breach
Malware Hacking Social Engineering
40% 52% 29%
Malware Impacts
Of Victims Report Measurable Impact to Business
80% 20142013 20142013
$5.9M$5.4M 32days
Average Cost of
a Breach
Average Time To
Resolve a Cyber-attack
MONTH
MONTH
MONTH
MONTH
45days
Cisco Security
5500
IPS Signatures in
Advanced Malware Protection (AMP)
21 Billion
Web Requests Through
Cisco Web Security (WSA+CWS)
35%
Of Global Enterprise Email Traffic
Processed Through Cisco Email
Security (ESA + CES)
Worms
Trojans Viruses
Rootkits
Sources
• Cisco Midyear Security Report 2014
• Cisco Annual Security Report 2014, ASR 2015
• ESG Endpoint security survey, Jan 15
• Ponemon Cost of Cyber crime, Oct 2014
• Ponemon cost of Data Breach 2013, May 2013
• Ponemon cost of Data Breach 2014, May 2014
• Ponemon cost of malware containment, Jan 2015
• 2014: A year of mega breaches, Ponemon
• 2013 & 2014 Verizon Data breach investigations report
www.cisco.com/go/emailsecurity
Protect your brand and data with Cisco Email and Web Security
www.cisco.com/go/websecurity
Industries Hit Hardest In 2014
Retail
$245M $80M $4.5M
Financial Services Healthcare
Top 2 Attack Vectors For Malware
Web Email

More Related Content

PDF
Malware and the Cost of Inactivity
PDF
CSS Trivia
PPTX
Cisco Web and Email Security Overview
PDF
Cisco Addresses the Full Attack Continuum
PDF
Data Center Security Challenges
PDF
Security Implications of the Cloud
PDF
Pervasive Security Across Your Extended Network
PDF
Cisco Content Security
Malware and the Cost of Inactivity
CSS Trivia
Cisco Web and Email Security Overview
Cisco Addresses the Full Attack Continuum
Data Center Security Challenges
Security Implications of the Cloud
Pervasive Security Across Your Extended Network
Cisco Content Security

What's hot (20)

PDF
Infographic - Three steps to stopping advanced email threats
PDF
Security Implications of the Cloud - CSS ATX 2017
PPTX
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
PDF
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
PPTX
Cyber Ethics: Cyber Security Services | VAPT and WAPT
PDF
Next Dimension and Veeam | Solutions for PIPEDA Compliance
PDF
Cyber Risk Management in the New Digitalisation Age - eSentinel™
PDF
Cyber Kill Chain Deck for General Audience
PDF
Advanced Web Security Deployment
PDF
FireEye Use Cases — FireEye Solution Deployment Experience
PDF
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
PPTX
Proatively Engaged: Questions Executives Should Ask Their Security Teams
PDF
Ransomware 2020 Report
PDF
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
PPTX
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
PDF
2 factor authentication beyond password : enforce advanced security with au...
PPTX
Mobile Security: Perceptions vs Device-harvested Reality
PDF
Microsoft Azure Sentinel
PDF
2013 Threat Report
PDF
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Infographic - Three steps to stopping advanced email threats
Security Implications of the Cloud - CSS ATX 2017
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Cyber Ethics: Cyber Security Services | VAPT and WAPT
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Kill Chain Deck for General Audience
Advanced Web Security Deployment
FireEye Use Cases — FireEye Solution Deployment Experience
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Ransomware 2020 Report
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
2 factor authentication beyond password : enforce advanced security with au...
Mobile Security: Perceptions vs Device-harvested Reality
Microsoft Azure Sentinel
2013 Threat Report
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Ad

Viewers also liked (9)

PDF
AMP Helps Cisco IT Catch 50% More Malware threats
PDF
3 Tips for Choosing a Next Generation Firewall
PDF
Midsize Business Solutions: Cybersecurity
PDF
Integrated Network Security Strategies
PDF
Balance Data Center Security and Performance
PDF
Infographic: Security for Mobile Service Providers
PDF
A Reality Check on the State of Cybersecurity
PPTX
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
PDF
Cisco ISE Reduces the Attack Surface by Controlling Access
AMP Helps Cisco IT Catch 50% More Malware threats
3 Tips for Choosing a Next Generation Firewall
Midsize Business Solutions: Cybersecurity
Integrated Network Security Strategies
Balance Data Center Security and Performance
Infographic: Security for Mobile Service Providers
A Reality Check on the State of Cybersecurity
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco ISE Reduces the Attack Surface by Controlling Access
Ad

Similar to The Cost of Inactivity: Malware Infographic (20)

PDF
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
PDF
Rcs triumfant watchful_webinar_final
PPTX
Information Security and Data Breach Trends 2014-2015
PPTX
ATOS: Preparing your business to manage cyber incidents
PDF
Cybersecurity Facts & Figures - What Every Business Needs to Know
PDF
CBIZ Cyber Security - What Every Business Needs to Know
PDF
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
PDF
The Need for Efficiency and Effectiveness
PDF
Convince your board - cyber attack prevention is better than cure
PDF
Infographic: Inside Data Breaches
PDF
Signacure Brochure
PDF
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19
PPTX
Defensible cybersecurity-jan-25th-
PDF
L123
PDF
InformationSecurity_11141
PDF
Treat a Breach Like a Customer, Not a Compliance Issue
PPTX
IT & Network Security Awareness
PPTX
Hacking the Human - How Secure Is Your Organization?
PDF
The new frontiers of it in apulia experiences for global security paul dcruz ...
PDF
Using Real World Metrics to Calculate Today's Cost of a Data Breach
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
Rcs triumfant watchful_webinar_final
Information Security and Data Breach Trends 2014-2015
ATOS: Preparing your business to manage cyber incidents
Cybersecurity Facts & Figures - What Every Business Needs to Know
CBIZ Cyber Security - What Every Business Needs to Know
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
The Need for Efficiency and Effectiveness
Convince your board - cyber attack prevention is better than cure
Infographic: Inside Data Breaches
Signacure Brochure
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19
Defensible cybersecurity-jan-25th-
L123
InformationSecurity_11141
Treat a Breach Like a Customer, Not a Compliance Issue
IT & Network Security Awareness
Hacking the Human - How Secure Is Your Organization?
The new frontiers of it in apulia experiences for global security paul dcruz ...
Using Real World Metrics to Calculate Today's Cost of a Data Breach

More from Cisco Security (16)

PDF
Incident Response Services Template - Cisco Security
PPTX
Cisco 2015 Midyear Security Report Slide Deck
PPTX
Enterprise Strategy Group: Security Survey
PDF
Infonetics Network and Content Security Vendor Scorecard
PDF
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
PDF
The Evolution of and Need for Secure Network Access
PDF
Cisco 2014 Midyear Security Report
PDF
String of Paerls Infographic
PDF
Midyear Security Report Infographic
PDF
Cisco Annual Security Report Infographic
PDF
City of Tomorrow Builds in Next-Generation Security
PDF
Laser Pioneer Secures Network End-to-End to Protect Assets
PDF
McAllen Intermediate School District
PDF
Leveraging Context-Aware Security to Safeguard Patient Data
PDF
William Paterson University
PDF
Secure, Automated Network Access for Any Device on Campus
Incident Response Services Template - Cisco Security
Cisco 2015 Midyear Security Report Slide Deck
Enterprise Strategy Group: Security Survey
Infonetics Network and Content Security Vendor Scorecard
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
The Evolution of and Need for Secure Network Access
Cisco 2014 Midyear Security Report
String of Paerls Infographic
Midyear Security Report Infographic
Cisco Annual Security Report Infographic
City of Tomorrow Builds in Next-Generation Security
Laser Pioneer Secures Network End-to-End to Protect Assets
McAllen Intermediate School District
Leveraging Context-Aware Security to Safeguard Patient Data
William Paterson University
Secure, Automated Network Access for Any Device on Campus

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Modernizing your data center with Dell and AMD
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Cloud computing and distributed systems.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation theory and applications.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
cuic standard and advanced reporting.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Modernizing your data center with Dell and AMD
Understanding_Digital_Forensics_Presentation.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Cloud computing and distributed systems.
MYSQL Presentation for SQL database connectivity
Encapsulation theory and applications.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
cuic standard and advanced reporting.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Reach Out and Touch Someone: Haptics and Empathic Computing
Review of recent advances in non-invasive hemoglobin estimation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation_ Review paper, used for researhc scholars
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

The Cost of Inactivity: Malware Infographic

  • 1. The Cost of Inactivity As the cost and likelihood of a breach grows you can’t afford “good enough” protection before, during, AND after an attack. Organizations Are Not Able To Detect A Breach In A Timely Manner 2+ Years to Discover the Breach 33% 55% Unable to Determine the Cause of the Breach Top 3 causes of a breach Malware Hacking Social Engineering 40% 52% 29% Malware Impacts Of Victims Report Measurable Impact to Business 80% 20142013 20142013 $5.9M$5.4M 32days Average Cost of a Breach Average Time To Resolve a Cyber-attack MONTH MONTH MONTH MONTH 45days Cisco Security 5500 IPS Signatures in Advanced Malware Protection (AMP) 21 Billion Web Requests Through Cisco Web Security (WSA+CWS) 35% Of Global Enterprise Email Traffic Processed Through Cisco Email Security (ESA + CES) Worms Trojans Viruses Rootkits Sources • Cisco Midyear Security Report 2014 • Cisco Annual Security Report 2014, ASR 2015 • ESG Endpoint security survey, Jan 15 • Ponemon Cost of Cyber crime, Oct 2014 • Ponemon cost of Data Breach 2013, May 2013 • Ponemon cost of Data Breach 2014, May 2014 • Ponemon cost of malware containment, Jan 2015 • 2014: A year of mega breaches, Ponemon • 2013 & 2014 Verizon Data breach investigations report www.cisco.com/go/emailsecurity Protect your brand and data with Cisco Email and Web Security www.cisco.com/go/websecurity Industries Hit Hardest In 2014 Retail $245M $80M $4.5M Financial Services Healthcare Top 2 Attack Vectors For Malware Web Email