1 in 99 Emails is a Phishing Attack, What Can Your Business Do?

July 12, 2019

On average, a cyber attack costs small businesses $53,987. While this is much less than the loss millions medium and large enterprises experience, proportion to size it is substantial. And one of the ways hackers wreak this havoc is using phishing attacks. So, what does a phishing attack costs your business? A new infographic from Avanan, offers some great insights into this cyber threat and what you can do about it. According to the Federal Trade Commission (FTC), phishing is “A type of online scam that targets consumers by sending them an e-mail that appears to be from a well-known source.” The scammers pretend to be an internet service provider, a bank, a mortgage company, or other entities.

Spotlight

Ponte Technologies

Ponte Technologies, founded in 2007, is a services-based company focused on developing operational IT security solutions, crafting IT security strategies, and deploying advanced defensive capabilities. We focus on secure software development, computer network operations, cyptography, trusted computing, security automation, and research in leading edge technologies (e.g., quantum computing, big data analytics). Ponte Technologies assists organizations in bringing advanced defensive technologies to bear on today's hard IT security problems. We provide talented, agile, research-focused staff with leading edge Information Assurance technology research experience. We develop software for both research tasks and production systems, and advise our clients on secure software development practices. We help people to understand what is going on in their networks, how their systems may have been compromised and how to regain control when all seems lost, and provide training on real-world cybersec

Other Infographics
news image

Cyber Security Checklist for 2019

Infographic | December 3, 2019

Over four in ten UK businesses(link is external) suffered a breach or attack during 2018-19, and 43% of cyber attacks are targeting small businesses(link is external). Use our easy to digest infographic to remind yourself and your staff of cyber security best practices, which have never been more important.

Read More
news image

Cybercrime By The Numbers

Infographic | January 3, 2020

Malware, ransomware, data breaches, and phishing are top of mind for most companies. As users, devices, applications, and data continue to move outside of the traditional enterprise perimeter and zone of control, attack surfaces will only expand. So, what are the realities of falling prey to a cyber attack?

Read More
news image

Effects of Virtualization Security Risks in Businesses

Infographic | February 19, 2022

Virtualization as a concept is experiencing more utility in recent times due to its ability to offer improved efficiency and scalability while reducing costs. Over 90% of businesses use server virtualization, and more organizations have begun exploring other types of virtualization, including desktop, application, and storage virtualization.

Read More
news image

Social Engineering Attack Facts

Infographic | April 4, 2022

Social engineering attacks exploit human error to access credentials or spread malware using infected email attachments or links to malicious websites.43% of IT experts report that they have been victims of social engineering.

Read More
news image

Almost half of companies say cybersecurity readiness has improved in the past year

Infographic | December 16, 2019

Mobile and IoT-connected devices present special security risks that many companies are still figuring out how to mitigate. ZDNet's sister site, Tech Pro Research, recently polled IT professionals about the state of cybersecurity in their workplaces. Most seemed to feel that cyberthreats were relatively well controlled. The majority of respondents said their company's cybersecurity readiness was average or above, and most said it had improved in the past year.

Read More
news image

Cyber Security Awareness

Infographic | December 20, 2019

Cyber security awareness promotes foundational understandings on cyber threats and risk, cyber hygiene, and appropriate response options. It informs citizens on best practices and proactive measures when confronted with cyber risks.

Read More

Spotlight

Ponte Technologies

Ponte Technologies, founded in 2007, is a services-based company focused on developing operational IT security solutions, crafting IT security strategies, and deploying advanced defensive capabilities. We focus on secure software development, computer network operations, cyptography, trusted computing, security automation, and research in leading edge technologies (e.g., quantum computing, big data analytics). Ponte Technologies assists organizations in bringing advanced defensive technologies to bear on today's hard IT security problems. We provide talented, agile, research-focused staff with leading edge Information Assurance technology research experience. We develop software for both research tasks and production systems, and advise our clients on secure software development practices. We help people to understand what is going on in their networks, how their systems may have been compromised and how to regain control when all seems lost, and provide training on real-world cybersec

Events