Cyber Security Stats For Mid-Year 2019 Infographic

October 15, 2019

Cyber Security Hub recently fielded an email survey to subscribers in May 2019 to benchmark what has happened so far in the first six months of the year. This mid-year checkpoint was a follow-up to the previously fielded survey that took place in November 2018.

Spotlight

Bishop Fox

Founded in 2005, Bishop Fox is a global information security consulting firm, serving as trusted advisors to the Fortune 1000, financial institutions, and high-tech startups. Our mission is to secure our clients and their business. Each member of our team brings expertise and perspective to the table. We put our background in government intelligence, the Fortune 100, Big 4 consulting, and global security to work for our clients. For more than a decade, we have authored best-selling security books, been cited in leading journals like Security Week and Dark Reading; been quoted in newspapers like USA Today; and been interviewed on local, national, and international television.

Other Infographics
news image

Who is behind cyber attacks?

Infographic | January 2, 2020

Regardless of the size or type of organisation you work for, it's important to understand why you might be vulnerable to cyber attack, and how to defend yourself. The advice summarised below is applicable to your working life and your home life. You should also familiarise yourself with any cyber security policies and practices that your organisation has already put in place.

Read More
news image

Infographic: Is Your Software Vulnerable to Cybercrime

Infographic | February 13, 2020

Third-party support and self-maintenance can’t protect youthe real solution is at the source. Don’t be fooled by third-party support providers and self-maintenance security methods. Security patching is essential for securing enterprise software, including Oracle’s. If you don’t own the code, you can’t access or update it. That leaves your software open to attack and your business open to risk.

Read More
news image

Cyber Security Infographics

Infographic | May 4, 2021

Organisations know cyber security is a major risk; they depend on the Internet and IT systems to communicate with their customers, suppliers, partners and staff.Drawing on our experience in helping senior executives address the key governance and leadership issues around cyber threats, CGI’s Cyber Security Services team have developed a set of actions that senior business leaders can use to focus their organisations on cyber risk readiness.

Read More
news image

Cybercrime By The Numbers

Infographic | January 3, 2020

Malware, ransomware, data breaches, and phishing are top of mind for most companies. As users, devices, applications, and data continue to move outside of the traditional enterprise perimeter and zone of control, attack surfaces will only expand. So, what are the realities of falling prey to a cyber attack?

Read More
news image

Social Engineering Attack Facts

Infographic | April 4, 2022

Social engineering attacks exploit human error to access credentials or spread malware using infected email attachments or links to malicious websites.43% of IT experts report that they have been victims of social engineering.

Read More
news image

CYBER SECURITY EXPOSURES INFOGRAPHIC

Infographic | January 16, 2020

It seems counterintuitive that cybercriminals would focus on small businesses. Major news outlets report on the largest incidents, which typically affect the largest companies. In the past, small businesses may have been able to neglect network security with little consequence, but this is not the case today. Small businesses generally have fewer IT resources and devote less time and money to cybersecurity than their larger counterparts.

Read More

Spotlight

Bishop Fox

Founded in 2005, Bishop Fox is a global information security consulting firm, serving as trusted advisors to the Fortune 1000, financial institutions, and high-tech startups. Our mission is to secure our clients and their business. Each member of our team brings expertise and perspective to the table. We put our background in government intelligence, the Fortune 100, Big 4 consulting, and global security to work for our clients. For more than a decade, we have authored best-selling security books, been cited in leading journals like Security Week and Dark Reading; been quoted in newspapers like USA Today; and been interviewed on local, national, and international television.

Events