Your SlideShare is downloading. ×
2015 Annual Security Report - Data Sheet
2015 Annual Security Report - Data Sheet
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

2015 Annual Security Report - Data Sheet

340

Published on

Download the Cisco 2015 Annual Security Report >> http://cs.co/ASR15SS

Download the Cisco 2015 Annual Security Report >> http://cs.co/ASR15SS

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
340
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  1. Cisco 2015 Annual Security Report | Regional Data Sheet | AMER Attack Methods for Distributing Malware, by Region Figure 1 shows the techniques adversaries are using most often to distribute malware. The findings in these charts are based primarily on where blocks of web malware occurred (that is, encounters), according to Cisco Cloud Web Security data, versus types of threats on the web. In AMER, users were targeted primarily by malicious scripts; iframe injections were a distant second. Spammers Up Their Game to Outwit Consumers Worldwide spam volumes are on the rise, indicating that spam is still a lucrative vector for online criminals. Adversaries continue to refine messages so that spam is more likely to fool recipients into clicking on dangerous links, often using social engineering tactics. While spam volume has generally been on the decline in the United States in 2014, levels rose in other countries during the same time period (Figure 2). Cisco Security Research suggests that this indicates some malicious actors may be shifting their base of operations. The rise in spam volume in some countries may also be a sign that other regions are catching up to the United States in terms of spam production, as the country has long been a leading source of worldwide spam. Ultimately, the United States ended the year higher. Figure 1. Attack Method Distribution, AMER Regional Data Sheet, AMER Cisco 2015 Annual Security Report As dynamic as the modern threat landscape is, there are some constants: Adversaries are committed to continually refining or developing new techniques that can evade detection and hide malicious activity. Meanwhile, security teams must constantly improve their approach to protecting the organization and users from these increasingly sophisticated campaigns. In the AMER Region, the Cisco 2015 Annual Security Report presents the following: Total %Attack Method 24.93% 17.43%iFrame Injection 13.63%Exploit 10.35% 10.06% OI (detection malware) Script Trojan Source: Cisco Security Research
  2. Signs of Security Sophistication The Security Capabilities Benchmark Study highlights the hallmarks of organizations that are more sophisticated in their security posture than others. These hallmarks include: ►► Executive leadership that prioritizes security ►► Clear, well-documented policies and procedures ►► Integrated tools that work together Organization Security Sophistication In comparing the security sophistication level of organizations by country, there’s more good news: Highly sophisticated organizations are the majority in every segment. However, respondents in some countries appear to have a more positive view of their own security stance than the outside world does. Overly confident perceptions from respondents in some countries may be due in part to core social values of a culture, such as the need to present one’s self—and thus, one’s organization—in a positive light. Figure 4. Most companies fit more sophisticated security profiles—this is true in all countries and industries Cisco 2015 Annual Security Report | Regional Data Sheet | AMER Figure 3. Highest-Risk Verticals for Malware Exposure Source: Cisco Security Research United States Brazil Taiwan 0.00% (1% 11/14) India China 25.00% (29% 11/14) Russia 3.00% (3% 11/14) Vietnam Korea, Republic of 1.00% (1% 11/14) 2.00% (3% 11/14) DecreaseIncrease 0.00% Change in % from Jan. to Nov. 2014 (November %) (2% 11/14) 1.00% (2% 11/14) 6.00% (20% 11/14) Figure 2. Spam Volumes by Country Segment distribution varies by country, but more mature segments dominate in all Segment Sizing United States Brazil 44% 16% 27% 10% 3% 34% 35% 24% 5% 2% High Upper-Mid Middle Low-Mid Low Source: Cisco Security Capabilities Benchmark Study magnitude 2.8Media and Publishing 2.4Accounting 1.1 1.1 Telecommunications IT and Utilities AMER Foo Insu Man Med EM Aviation 5.0 Agr Source: Cisco Security Research Americas Headquarters Cisco Systems Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems (USA) Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners, The use of the word partner does not imply a partnership between Cisco and any other company. (1110R) Download Cisco 2015 Annual Security Report www.cisco.com/go/asr2015

×