The Importance of
Cybersecurity in 2017
Cybercrime is now a $ 600 billion
opportunity. It’s a well-organized business
affecting both IT corporations and small
companies. In fact, hackers consider small
and medium-sized businesses an easier
target due to weak defense systems.
All rights reserved © R-Style Lab 2017
THESE ARE CYBERCRIME TOP TARGETS
24.8
11.9
9.3
4.2 4.1 3.4 3.2
1.9
0
5
10
15
20
25
30
(%)
All rights reserved © R-Style Lab 2017
SOME SHOCKING CYBERSECURITY STATS…
• Every day, 200 thousand new malware samples
are captured;
• Through 2016, 4 thousand ransomware attacks
took place on a daily basis;
• Over 70% of companies affected by ransomware
paid hackers to regain access to customer
records last year. 20% of those had to pay over $
40 thousand;
• More than 59% of infections came from emails.
78% of employees clicked on embedded links
despite being aware of security risks.
All rights reserved © R-Style Lab 2017
YET, CYBERSECURITY THREATS ARE
IGNORED
52
31 31
0
10
20
30
40
50
60
No changes planned
Making changes to security
plans
Not sure
Business Security Strategy for 2017
(% of companies surveyed)
All rights reserved © R-Style Lab 2017
TOP CAUSES OF ATTACKS & DATA BREACHES
48
41
35
27
5
32
0
10
20
30
40
50
60
Employee
negligence
3rd-party
mistakes
System error Hacker
attacks
Malicious
insider
Unidentified
(%)
All rights reserved © R-Style Lab 2017
COMMON TYPES OF BUSINESS
CYBERATTACKS
49
43
35
26 25
21
11
2
0
10
20
30
40
50
60
(%)
In 2017, ransomware attacks are expected to grow by 250%,
causing over $ 5 billion in damage
All rights reserved © R-Style Lab 2017
A typical cyberattack victim
is denied access to computers within a
business network & file servers.
Each hour of downtime will cost your small
business over $ 8 thousand. Unless you
consult experienced software developers &
treat cybersecurity seriously, tomorrow
cybercrime might affect you.
All rights reserved © R-Style Lab 2017
HERE’S HOW TO SECURE YOUR IT
INFRASTRUCTURE (pt. 1)
• Create a corporate security policy regarding
acceptable use, password generation and
defenses against social engineering (and make
sure your employees adhere to it!);
• Encrypt & backup business data (copy of
backup data should be kept off-premises);
• Conduct employee screening to detect
malicious insiders;
• Standardize security protocols to address the
Bring Your Own Device challenge;
All rights reserved © R-Style Lab 2017
HERE’S HOW TO SECURE YOUR IT
INFRASTRUCTURE (pt. 2)
• Maintain security patches and simplify
firmware updates (cybercriminals always look
for vulnerabilities and come up with new hacking
techniques);
• Design software/hardware products with
security in mind (from choosing a secure
website CMS to implementing reliable IoT
messaging protocols, security should be your top
priority);
• Educate users (only 31% of IoT adopters, for
example, update to the latest version of
firmware; most users continue to use default
passwords). All rights reserved © R-Style Lab 2017
The r-stylelab.com team urges you to
follow cybersecurity best practices,
keep detailed logs and report attacks to
authorities. Together we can make
cyberspace a safer place!
All rights reserved © R-Style Lab 2017
REPRESENTATIVE OFFICE
425 Market Street,
San Francisco, CA, 94105
+1 888 414 6445
ask@r-stylelab.com
DEVELOPMENT FACILITIES
76A Masherova Ave,
220035, Minsk, Belarus
+375 17 306 48 42
+375 29 348 44 44
SOURCES:
https://smallbiztrends.com/2017/01/cyber-security-statistics-small-business.html
https://www.forbes.com/sites/kateharrison/2016/05/03/the-best-practices-in-cyber-security-
for-small-to-medium-sized-businesses/#653fc4697346
http://r-stylelab.com/company/blog/iot/iot-security-challenges-where-do-we-go-from-here
https://smallbiztrends.com/2017/01/cyber-security-statistics-small-business.html
https://www.observeit.com/blog/10-best-practices-cyber-security-2016
https://blog.barkly.com/cyber-security-statistics-2017
All rights reserved © R-Style Lab 2017

More Related Content

PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PPTX
Ransomware
PPTX
Introduction to cyber security amos
PPTX
Cyber security
PPTX
Cyber security
PDF
Cyber security
PPTX
Ppt on cyber security
PPTX
Cyber security
Application Security | Application Security Tutorial | Cyber Security Certifi...
Ransomware
Introduction to cyber security amos
Cyber security
Cyber security
Cyber security
Ppt on cyber security
Cyber security

What's hot (20)

PPTX
Cybersecurity PowerPoint Presentation
PPTX
Cyber security
PPTX
Hacking and Types of Hacker.
PPTX
Cyber crime and security
PPTX
Cyber security
PPTX
Cyber Security Introduction.pptx
PPT
Cyber security & Importance of Cyber Security
PPTX
Introduction to Cybersecurity Fundamentals
PPT
PPTX
Cyber security
PPTX
Cybercrime and Security
PPTX
Cyber security
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
Cyber Security Presentation
PPTX
cyber security
PPT
Cyber Crime and Security
PPTX
Cybersecurity
PPTX
Introduction to penetration testing
PPTX
Cyber security
PPTX
Ethical hacking
Cybersecurity PowerPoint Presentation
Cyber security
Hacking and Types of Hacker.
Cyber crime and security
Cyber security
Cyber Security Introduction.pptx
Cyber security & Importance of Cyber Security
Introduction to Cybersecurity Fundamentals
Cyber security
Cybercrime and Security
Cyber security
Cybersecurity Attack Vectors: How to Protect Your Organization
Cyber Security Presentation
cyber security
Cyber Crime and Security
Cybersecurity
Introduction to penetration testing
Cyber security
Ethical hacking
Ad

Similar to The Importance of Cybersecurity in 2017 (20)

PDF
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
PPTX
Understanding Your Attack Surface and Detecting & Mitigating External Threats
PDF
Trend Micro Solutions Overview
PDF
Cybersecurity Trends 2024: Protect Your Business from Emerging Threats
PDF
Cybersecurity- What Retailers Need To Know
PPTX
The 2018 Threatscape
PPTX
Too Small to Get Hacked? Think Again (Webinar)
PPTX
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
PPTX
Bordless Breaches and Migrating Malware
PDF
Enable your employees to work securely from anywhere with digital workplace
PPTX
Netwatcher Credit Union Tech Talk
PPTX
Cybersecurity All information and topic wise
PDF
Convince your board - cyber attack prevention is better than cure
PDF
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
PDF
Cybersecurity 2024 - Alberto Boaventura v2.0.pdf
PPTX
Accenture Security Services: Defending and empowering the resilient digital b...
PPT
Presentation gdl
PPTX
Best Security Practices for a Web Application
PPTX
Cyber Resilency VANCOUVER, BC Nov 2017
PDF
Securing Manufacturing: How we can improve speed and efficiency while protect...
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Trend Micro Solutions Overview
Cybersecurity Trends 2024: Protect Your Business from Emerging Threats
Cybersecurity- What Retailers Need To Know
The 2018 Threatscape
Too Small to Get Hacked? Think Again (Webinar)
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Bordless Breaches and Migrating Malware
Enable your employees to work securely from anywhere with digital workplace
Netwatcher Credit Union Tech Talk
Cybersecurity All information and topic wise
Convince your board - cyber attack prevention is better than cure
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2024 - Alberto Boaventura v2.0.pdf
Accenture Security Services: Defending and empowering the resilient digital b...
Presentation gdl
Best Security Practices for a Web Application
Cyber Resilency VANCOUVER, BC Nov 2017
Securing Manufacturing: How we can improve speed and efficiency while protect...
Ad

More from R-Style Lab (17)

PDF
R-Style Lab: Smart Solutions for Healthcare Providers
PDF
R-Style Lab Web Development Portfolio
PDF
R-Style Lab UI & UX Design Portfolio
PDF
Comprehensive IoT Development Services to Empower Your Business
PDF
R-Style Lab: Company, Processes, Expertise
PDF
How to Leverage IoT for Business Growth: Infographic
PPTX
Internet of Things in Business: Applications & Potential Benefits
PDF
How to Sell Mobile App Idea?
PPTX
Web Development Trends to Watch in 2018
PDF
Top 4 VR Business Use Cases
PDF
IoT Impact on Business
PDF
iOS vs Android by Numbers
PDF
5 Steps to Mobile Game Success
PDF
How to Meet Google Play Requirements?
PDF
How to Get App Store Approval?
PPTX
Complete guide to outsourcing software development
PDF
Mobile Apps for Small Businesses - Success Strategy
R-Style Lab: Smart Solutions for Healthcare Providers
R-Style Lab Web Development Portfolio
R-Style Lab UI & UX Design Portfolio
Comprehensive IoT Development Services to Empower Your Business
R-Style Lab: Company, Processes, Expertise
How to Leverage IoT for Business Growth: Infographic
Internet of Things in Business: Applications & Potential Benefits
How to Sell Mobile App Idea?
Web Development Trends to Watch in 2018
Top 4 VR Business Use Cases
IoT Impact on Business
iOS vs Android by Numbers
5 Steps to Mobile Game Success
How to Meet Google Play Requirements?
How to Get App Store Approval?
Complete guide to outsourcing software development
Mobile Apps for Small Businesses - Success Strategy

Recently uploaded (20)

PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PDF
AI Guide for Business Growth - Arna Softech
PDF
Ableton Live Suite for MacOS Crack Full Download (Latest 2025)
PPTX
Cybersecurity: Protecting the Digital World
PDF
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
PDF
MCP Security Tutorial - Beginner to Advanced
PDF
Autodesk AutoCAD Crack Free Download 2025
PPTX
Computer Software - Technology and Livelihood Education
PDF
Wondershare Recoverit Full Crack New Version (Latest 2025)
PDF
How Tridens DevSecOps Ensures Compliance, Security, and Agility
PPTX
GSA Content Generator Crack (2025 Latest)
PDF
iTop VPN Crack Latest Version Full Key 2025
PPTX
Oracle Fusion HCM Cloud Demo for Beginners
PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
Time Tracking Features That Teams and Organizations Actually Need
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PDF
Microsoft Office 365 Crack Download Free
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
AI Guide for Business Growth - Arna Softech
Ableton Live Suite for MacOS Crack Full Download (Latest 2025)
Cybersecurity: Protecting the Digital World
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
MCP Security Tutorial - Beginner to Advanced
Autodesk AutoCAD Crack Free Download 2025
Computer Software - Technology and Livelihood Education
Wondershare Recoverit Full Crack New Version (Latest 2025)
How Tridens DevSecOps Ensures Compliance, Security, and Agility
GSA Content Generator Crack (2025 Latest)
iTop VPN Crack Latest Version Full Key 2025
Oracle Fusion HCM Cloud Demo for Beginners
Weekly report ppt - harsh dattuprasad patel.pptx
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Computer Software and OS of computer science of grade 11.pptx
Time Tracking Features That Teams and Organizations Actually Need
Why Generative AI is the Future of Content, Code & Creativity?
Microsoft Office 365 Crack Download Free

The Importance of Cybersecurity in 2017

  • 2. Cybercrime is now a $ 600 billion opportunity. It’s a well-organized business affecting both IT corporations and small companies. In fact, hackers consider small and medium-sized businesses an easier target due to weak defense systems. All rights reserved © R-Style Lab 2017
  • 3. THESE ARE CYBERCRIME TOP TARGETS 24.8 11.9 9.3 4.2 4.1 3.4 3.2 1.9 0 5 10 15 20 25 30 (%) All rights reserved © R-Style Lab 2017
  • 4. SOME SHOCKING CYBERSECURITY STATS… • Every day, 200 thousand new malware samples are captured; • Through 2016, 4 thousand ransomware attacks took place on a daily basis; • Over 70% of companies affected by ransomware paid hackers to regain access to customer records last year. 20% of those had to pay over $ 40 thousand; • More than 59% of infections came from emails. 78% of employees clicked on embedded links despite being aware of security risks. All rights reserved © R-Style Lab 2017
  • 5. YET, CYBERSECURITY THREATS ARE IGNORED 52 31 31 0 10 20 30 40 50 60 No changes planned Making changes to security plans Not sure Business Security Strategy for 2017 (% of companies surveyed) All rights reserved © R-Style Lab 2017
  • 6. TOP CAUSES OF ATTACKS & DATA BREACHES 48 41 35 27 5 32 0 10 20 30 40 50 60 Employee negligence 3rd-party mistakes System error Hacker attacks Malicious insider Unidentified (%) All rights reserved © R-Style Lab 2017
  • 7. COMMON TYPES OF BUSINESS CYBERATTACKS 49 43 35 26 25 21 11 2 0 10 20 30 40 50 60 (%) In 2017, ransomware attacks are expected to grow by 250%, causing over $ 5 billion in damage All rights reserved © R-Style Lab 2017
  • 8. A typical cyberattack victim is denied access to computers within a business network & file servers. Each hour of downtime will cost your small business over $ 8 thousand. Unless you consult experienced software developers & treat cybersecurity seriously, tomorrow cybercrime might affect you. All rights reserved © R-Style Lab 2017
  • 9. HERE’S HOW TO SECURE YOUR IT INFRASTRUCTURE (pt. 1) • Create a corporate security policy regarding acceptable use, password generation and defenses against social engineering (and make sure your employees adhere to it!); • Encrypt & backup business data (copy of backup data should be kept off-premises); • Conduct employee screening to detect malicious insiders; • Standardize security protocols to address the Bring Your Own Device challenge; All rights reserved © R-Style Lab 2017
  • 10. HERE’S HOW TO SECURE YOUR IT INFRASTRUCTURE (pt. 2) • Maintain security patches and simplify firmware updates (cybercriminals always look for vulnerabilities and come up with new hacking techniques); • Design software/hardware products with security in mind (from choosing a secure website CMS to implementing reliable IoT messaging protocols, security should be your top priority); • Educate users (only 31% of IoT adopters, for example, update to the latest version of firmware; most users continue to use default passwords). All rights reserved © R-Style Lab 2017
  • 11. The r-stylelab.com team urges you to follow cybersecurity best practices, keep detailed logs and report attacks to authorities. Together we can make cyberspace a safer place! All rights reserved © R-Style Lab 2017
  • 12. REPRESENTATIVE OFFICE 425 Market Street, San Francisco, CA, 94105 +1 888 414 6445 ask@r-stylelab.com DEVELOPMENT FACILITIES 76A Masherova Ave, 220035, Minsk, Belarus +375 17 306 48 42 +375 29 348 44 44 SOURCES: https://smallbiztrends.com/2017/01/cyber-security-statistics-small-business.html https://www.forbes.com/sites/kateharrison/2016/05/03/the-best-practices-in-cyber-security- for-small-to-medium-sized-businesses/#653fc4697346 http://r-stylelab.com/company/blog/iot/iot-security-challenges-where-do-we-go-from-here https://smallbiztrends.com/2017/01/cyber-security-statistics-small-business.html https://www.observeit.com/blog/10-best-practices-cyber-security-2016 https://blog.barkly.com/cyber-security-statistics-2017 All rights reserved © R-Style Lab 2017