Think Like a Cybercriminal
As long as businesses continue to operate and make money, cybercriminals will look for ways to break in, exploit weaknesses and steal. To defeat them, you need to think like a cybercriminal to find the angles they could use to exploit your systems.

6 Angles Cybercriminals Exploit
1 STOLEN DEVICES
The Threat

Hackers stealing sensitive data
80
% of the cost of a stolen laptop is from stolen data
The Fix
Encrypt all devices and use an asset-tracking tool to keep inventory
2 POOR USER AWARENESS
The Threat

Weak passwords and phishing scams
85
% of organizations have experienced a phishing attack
The Fix
Provide user awareness training
3 OUT-OF-DATE ANTIVIRUS
The Threat

New malware strains come online daily
390000
new malware strains created each day
The Fix
Update virus definitions and leverage behavioral and heuristic scans
4 UNPATCHED SOFTWARE
The Threat

Out-of-date software can be susceptible to automated attacks
25
% of Microsoft Windows users run the latest, fully patched version
The Fix
Use a patch management tool to keep up
5 MALICIOUS SOFTWARE
The Threat

Drive-by downloads or phishing websites to steal credentials
195000
unique domains were used for phishing attacks in 2016
The Fix
Deploy a web content-filtering solution to keep users off malicious websites
6 LACK OF MONITORING
The Threat

Attacks often go unnoticed
205
days is the average time it takes for organizations to discover an intrusion
The Fix
Use a strong monitoring system to detect unauthorized access
Cybercriminals are continually developing new ways to exploit our businesses and therefore we cannot afford to become complacent and consider that all bases are covered.
By actively participating and contributing to the wider security community and by collaborating with leading Cyber Security authorities Syntax IT Services are perfectly placed to support existing and new customers alike.
Want to understand how Syntax IT Services can support the ever changing Cyber security needs of your business? Call us today
Footnotes:
- Mobile Device Security: Startling Statistics on Data Loss and Data Breaches, ChannelPro Network. http://breachlevelindex.com/assets/Breach-Level-Index-Report-2016-Gemalto.pdf (accessed July 2017).
- Phishing by the Numbers: Must-Know Phishing Statistics, 2016, Barkly. https://blog.barkly.com/phishing-statistics-2016 (accessed July 2017).
- https://www.av-test.org/en/statistics/malware/ (accessed July 2017).
- The 2016 Duo Trusted Access Report, Duo Security. https://duo.com/assets/ebooks/duo-trusted-access-report.pdf (accessed July 2017).
- Domain Use and Trends, APWG. https://apwg.org//resources/apwg-reports/domain-use-and-trends (accessed July 2017).
- M-Trends 2015: A View from the Front Lines, Mandiant. https://www2.fireeye.com/WEB-2015-MNDT-RPT-M-Trends-2015_LP.html (accessed July 2017).