Title: Some of the Shocking Stats of Cyber Security
1Some of the Shocking Stats of
CYBER SECURITY
www.promisec.com
PROMISEC
2Cyber security is the major concern of IT
industry nowadays as number of cyber crimes occur
every second or every minute. Cyber security
provides techniques to protect computers,
programs, data and networks from any unauthorized
identities that want to exploit the security.
More and more malwares and attacks are getting
added day by day. According to some research, it
has been that around 2, 30,000 malwares are added
in a day. There are many cyber criminals who
exploit the security of many organizations and
even tend to steal the confidential information
of individuals.
PROMISEC
www.promisec.com
3Shocking Stats of Cyber Security that can be
improved by File Integrity Monitoring
PROMISEC
www.promisec.com
4Have you ever heard that a virus can cause a lot
of damage? Yes, there are some viruses that do
not only damage the data, but also harms the
finance of an organization.
Cyber security has affected healthcare industry
in a great way that 23 of the data breaches have
been done to the data of healthcare industries.
There are number of people who use applications
like Adobe Reader, Adobe Flash or Java that are
more vulnerable to risks. It has been surveyed
that around 99 of computer users have these
applications on their systems.
PROMISEC
www.promisec.com
5According to some survey, millions of web attacks
occurred every day in the year 2015 because the
administrators of websites were unable to secure
the websites. Out of all legitimate websites,
there are around 75 of the websites that are at
risk.
It has been found that 98 of web applications
that are tested has more chances of attacking the
security.
According to a research, it is discovered that
every year, around 80 million to 90 million
attacks that in turn causes 400 new attacks per
minute. Out of these attacks, around 70 attacks
remain unnoticed.
PROMISEC
www.promisec.com
6Use of File Integrity Monitoring in Cyber
Security
Role of FIM is to allow system administrators,
managers and security professionals to look into
the files and directories that change over the
time. It basically validates the integrity of
files of application softwares and operating
system with the help of a verification technique.
PROMISEC
www.promisec.com
7Shielding Your Network with
ENDPOINT PROTECTION
MANAGEMENT
Dont be complacent about your security Products
with intrusion prevention system are
effective Encryption for all communication
channels is a necessity Remote devices need as
much attention Limited user privileges are
helpful User accounts should be appropriately
protected
PROMISEC- ENDPOINT INTELLIGENCE
8CONTACT US
Support_at_promisec.com
www.promisec.com
_at_Promisec_IT