jagomart
digital resources
picture1_Business Ppt Templates 73038 | Stc 2017 Suny Ow Cisco Email Secuirty


 146x       Filetype PPTX       File size 2.20 MB       Source: coa.suny.edu


File: Business Ppt Templates 73038 | Stc 2017 Suny Ow Cisco Email Secuirty
project details the why s the who s the what s email is the 1 threat vector due to wide reach of email and its nature it remains 1 attack ...

icon picture PPTX Filetype Power Point PPTX | Posted on 31 Aug 2022 | 3 years ago
Partial capture of text on file.
      Project Details – The Why’s, The Who’s, The What’s….
                               Email is the #1 threat vector!
                       Due to wide reach of Email and its nature, it remains #1 attack 
                                                                                 vector.
                •   Customers are plagued with Phishing campaigns, Business Email Compromise scams (BEC) & Ransomware attacks
                •   Over $50M lost by US companies due to Phishing attacks
                •   Close to $3.1B lost due to Business Email Compromise (BEC) scams
                •   $60M average loss due to a single Ransomware campaign
       Blended Attacks
                                                Ransomware
                                              9515                                     With a high success rate 
                                                           $60M
                                               Ransoms      In                         and significant revenues 
                                               paid per 
                                                month       revenue 
                                                            per                        being generated. The 
                                             2015                        2016campaign  sophistication of these 
                                                                                       attacks will only 
                  Spoofing / BEC                                                       increase.
                 270%            $2.5B 
                  increase       in losses                Phishing
                                 reported 
                                 by US             94%
                                 firms                             $500
                2015                        2016   of phish
                                                   have an         M in 
                                                   attachme        losses due 
                                                   nt              to 
                                                   30%             phishing
                                                   are 
                                                   opened
              Benefits and Risks of Cloud Email 
      Human 
      Human 
        & 
        &                   Services
      Technical 
      Technical                                  Legal & 
                                                 Legal & 
      Resource                                  Regulatory 
      Resource                                  Regulatory 
                                                Complianc
      savings    Disaster                       Complianc
      savings    Disaster 
                                                  e
               Recovery and                       e
               Recovery and           Integration 
                  Fault               Integration 
                  Fault              with existing 
                                     with existing 
                 Tolerance
                 Tolerance           infrastructur
                                     infrastructur
                                        e 
                                        e 
                                                  Business 
                                                  Business 
                                                  Continuit
     Simplified                                   Continuit
     Simplified                                     y
    Architecture                                    y
    Architecture 
                                           Audit, 
                                           Audit, 
                                          Visibility & 
     Maintenanc                           Visibility & 
     Maintenanc                           Location 
                  Scalabilit              Location 
        e         Scalabilit              of Data
        e                                 of Data
                  y and On-                        Future 
                  y and On-                        Future 
                                                  demand 
                  Demand                          demand 
                  Demand 
                                                   & cost
                  resources                        & cost
                  resources
              History of OW 
              Email
              •   SUNY OW had the same concerns about 
                  cloud email platform
              •   Moved from Google Apps to Office 365 in 
                  Summer of 2016
              •   On both systems users were attacked by 
                  spam, ransomware and phishing campaigns
              •   Prior to Cisco, we evaluated Microsoft 
                  Active Threat Protection and Symantec
                     •   Microsoft Active Threat protection didn’t 
                         prove sufficient
                     •   Symantec licensing turned out a bit too 
                         expensive
The words contained in this file might help you see if this file matches what you are looking for:

...Project details the why s who what email is threat vector due to wide reach of and its nature it remains attack customers are plagued with phishing campaigns business compromise scams bec ransomware attacks over m lost by us companies close b average loss a single campaign blended high success rate ransoms in significant revenues paid per month revenue being generated sophistication these will only spoofing increase losses reported firms phish have an attachme nt opened benefits risks cloud human services technical legal resource regulatory complianc savings disaster e recovery integration fault existing tolerance infrastructur continuit simplified y architecture audit visibility maintenanc location scalabilit data on future demand cost resources history ow suny had same concerns about platform moved from google apps office summer both systems users were attacked spam prior cisco we evaluated microsoft active protection symantec didn t prove sufficient licensing turned out bit too expe...

no reviews yet
Please Login to review.