Please wait while we're loading the animation.

Laptop

Hack

Impact

One in ten laptops is stolen or lost.
Lost laptops cost $1.8 billion each year
and data breach costs represent
$1.44 billion of that cost.

Remedy

Comprehensive endpoint security on all
laptops, including anti-malware, web
security, email security, firewall and full
disk encryption.

Back

Cloud Storage

Hack

Impact

85% of executives believe that cloud storage security is the greatest issue facing the cloud.

Remedy

Use secure protocols such as SSL or
TLS for browsers or a virtual private
network (VPN) to extend a private
network across the public Internet.

Back

Trash Bin And Shredder

Hack

  • physical theft

Impact

88% of information collected by identity
thieves comes from dumpster diving,
and criminals use sophisticated software
to reconstruct shredded documents.

Remedy

Properly dispose of all CD's, DVDs,
credit cards and documents by using
a high quality microcut shredder.

Back

Risky Online Behavior

Hack

Impact

78% of organizations have experienced
a data breach as a result of risky
employee behavior.

Remedy

Monitor and control employee web
and email traffic with URL filtering,
web and email security solutions.

Back

All-in-one printer,
Copier & Fax

Hack

Impact

Since all-in-ones are intelligent,
Internet connected devices malware
can easily by transferred onto a networked
all-in-one and onto other company devices.

Remedy

Install anti-malware web security
software, and always wipe device hard
drives when disposing of old all-in-ones.

Back

Tablet

Hack

Impact

96% of smartphones and tablets lack the necessary security software needed to protect from malicious attacks.

Remedy

Anti-malware, email and web security
on all devices.

Back

Email

Hack

Impact

There are over 33,000 phishing attacks
each month which cost companies over
$175 million monthly.

Remedy

Install McAfee SaaS Endpoint & Email
Protection.

Back

External Hard Drive And Flash Drives

Hack

Impact

An estimated 25,000 drives get left behind
in taxi cabs in NYC and London every
six months.

Remedy

Encrypt all confidential data on
removable devices.

Back

Smart Phones

Hack

Impact

95% of IT departments allow employees
to bring their own device (BYOD) to the
workplace, but only 43% of companies have
a BYOD strategy.

Remedy

Install encryption, web and email
security solutions on all devices.
Create a company-wide BYOD policy.

Back

Remote Workers

Hack

Impact

There are 15 to 20 million road warriors in
the US who lose more than 12,000 laptops
per week in airports alone.

Remedy

Require use of a virtual private network
(VPN). Make sure all devices have
complete endpoint security solutions
installed, including up-to-date
anti-malware, encryption, email and web
security and personal firewall.

Back

Botnet

Close

A bot network (botnet) is a network
of hijacked zombie computers controlled
remotely by a hacker.
The hacker uses the network to send spam
and launch Denial of Service attacks

Malicious Takeover

Close

Attack that can take over a device
to launch attacks, store data,
retrieve documents, and print material.

Malware

Close

Malware is a generic term
used to describe malicious
software such as viruses,
Trojan horses, spyware, and
malicious active content.

Keyloggers

Close

Malicious programs that record
the key strokes a user types
on their PC, including instant
message and email text,
email addresses, web sites visited,
passwords, credit card
and account numbers, addresses,
and other private data.

Spam

Close

Unsolicited or undesired bulk
electronic messages.
There is email spam,
instant messaging spam,
Usenet newsgroup spam,
web search-engine spam,
spam in blogs,
and mobile phone-messaging spam.
Spam includes legitimate
advertisements, misleading
advertisements, and phishing
messages designed to trick
recipients into giving
up personal and financial
information.

Password Sniffing

Close

The use of a sniffer to capture
passwords as they cross a network.
The network could be a local
area network, or the Internet itself

Phishing

Close

A form of criminal activity using
social engineering techniques
through email or instant messaging.
Phishers attempt to fraudulently
acquire other people's personal
information, such as passwords
and credit card details,
by masquerading as a trustworthy
person or business in an apparently
official electronic communication.

Wifi hotspot attacks

Close

Wifi attacks can range from port sniffing
(reading web data as it is transmitted
across ports on the internet)
to Man-in-the-Middle Attacks
(active eavesdropping by a third party)
to sidejacking (remotely intercepting username
and password information).