[INFOGRAPHIC] Don't Be The Victim Of A Cyberheist




We have created a new infographic for your users, as part of your ongoing security awareness program. It's a few good reminders how to stay safe online, and to keep their awareness levels at the appropriate level... HIGH! 

 

Don't Be A Victim Of Cyberheist Infographic

Here is a breakdown of the information contained in this infographic along with our sources:

Never Insert an Unknown USB Stick in Your Computer

New research shows that nearly half of users actually will plug in an unknown USB drive. This is a BIG security risk, the criminals know this and will use it to try and phish your employees. 

Always Lock Your Workstations

This one is self-explanatory. ANYONE can access your information if you don't take this basic security measure. If you have access to private information you could also lose your job, that should be reason enough

91% of Successful Data Breaches Started With A Spear-Phishing Attack (techworld)

These are very targeted social engineering attacks designed to send a user a highly personal phishing attempt in the hopes that it will be believable enough to be clicked on. Criminals are finding the old 'spray and pray' approach to sending out mass phishing emails is not as successful as a more targeted attack.

75M PHISHING Scam Emails Are Sent Every Day (Cybercrimes Watch)

This amount of emails results in about 2,000 victims per day. Remember the signs to watch out for before replying, opening an attachment, or clicking on a link in what could be a suspicious email. 

9 of 10 Phishing Emails Are Now RANSOMWARE (CSO Online)

That's a significant increase over 5 of 10 just in December, and 1 of 10 for every other month last year. Also, the amount of ransomware domains has exploded 3500% in Q1 2016 compared to Q4 2015. Ransomware is very easy for cybercriminals to send and offers a good ROI for not a lot of work, so these numbers will only go up as time goes on.

Never Use A Post-It Note For Storing Your Passwords

Really, this shoud be common sense but it happens all the time. A lot of users post their computer password right on their monitors. This is NOT SAFE! Use a password manager to store all your unique, strong passwords so you have fewer passwords you need to remember. 

Never Open Email Attachments You Didn't Ask For

Always think twice before you click! If you get an attachment you weren't expecting it's best to give the entire email a second and even a third look before opening. If you don't know the sender, if the message doesn't make sense, or if the file type is something you don't recognize you probably don't want to open that attachment.

4,000 Cyber Attacks Occur Each and EVERY DAY (CBS)

That number breaks down to 170 attacks per hour and 3 attacks every minute. Numbers for attacks on businesses are lower but still worrying: 46 per day or about 2 every hour.  

$2.3 Billion is the Estimated Annual Cost of Global RANSOMWARE (FBI)
 
17,642 ransomware victims reported to the FBI to make up that cost. That is a 270% increase since January of 2015!
 
Make Sure You Are Using A HTTPS Connection When Using A Credit Card Transaction
 
That one little letter differentiates between sites that have an SSL (Secure Socket Layer) and those that don't. Sites that are SSL certified protect your credit card number and other personal information you exchange when making transactions online. Before you complete any transaction make sure the url starts with "https" rather than "http".
 

 

You can attach this to an email, print it, make posters of it, or even fit the graphic in a screen saver.  

Here are the downloads:

SMALL: http://cdn2.hubspot.net/hubfs/241394/CyberheistInfographic-SM.jpg

 

 
A great way to see if your users got the message is sending a Phishing Security Test.
Here is a way to do this for free:
Get My Free Phishing Security Test Now!
 
Don't like to click on redirected buttons? Cut & Paste this in your browser:





 
 

Topics: Social Engineering, Phishing, Spear Phishing, Cybercrime, Ransomware

Subscribe To Our Blog


New call-to-action

Recent Posts




Get the latest about social engineering

Subscribe to CyberheistNews