Cyber risk

Cyber criminals are after your data! If they can access your devices they will. While there’s an obvious direct loss, the breach will cost you far more in fines and reputation loss.

It’s not a matter of if, but when you will suffer a cyber attack!

Are you prepared?

There is an estimated cyber attack every 39 seconds. As is often stated, “it is not a matter of if, but when you will suffer a cyber attack”.

Small to medium organisations

Around 43% of cyber attacks target small organisations (500 employees or less) and on average these organisations spend an average of USD $7.68 million per incident.

Enterprise organisations

Over 60% of the Fortune 1000 had at least one public data breach over the last decade, according to a Cyentia Institute research report. On an annual basis, it is estimated that one in four Fortune 1000 firms will suffer a cyber loss event. A hack can sink a company’s stock price and leave investors fuming. In the wake of the Capital One hack, which was publicly reported in July 2019, the company’s stock price dropped nearly 6% immediately in after-hours trading, losing a total of 13.89% over two weeks.

The value at risk

The value at risk is the maximum potential cost to your business if your sensitive data is lost, breached or held to ransom. It’s based on the number of data records you have on your devices and real-world data collected by IBM and the Poneman Institute for business size, sector and geography.

  • Direct costs: forensic investigation, IT system remediation, fines, customer compensation, etc.
  • Indirect costs: lost business opportunities as a consequence of negative reputation, share price impact, etc.

Addressing the problem

One of the biggest threats to cyber security is complexity. It’s just too hard to understand let alone manage.

You may already have security solutions from various vendors. These solutions tend to be highly specific, miss the big picture and do not focus on your actual risk exposure. You end up spending time and effort in the wrong place and miss the real threats.

What you want is confidence that your entire estate of data and devices is protected. And if there are risks, you want them identified with a clear and prioritised action plan.

Cyban mitigates the problem

Cyban helps you reduce vulnerability by making cyber easy to understand and react to.

It helps you manage your exposure to risk of digital assets on devices across your organisation. Cyban demystifies cyber security and gives you peace of mind. It continuously detects, measures and provides insights about all your digital assets on any device.

Example cyber attacks

Ransomware

Ransomware is malicious software that infects and encrypts devices, only restoring access once the victim has made a payment to the attacker. If even a single device on your network is vulnerable, this could put your entire network at risk of a widespread ransomware attack.

Malware
Malware describes a set of malicious software such as, but not limited to, viruses, trojans, ransomware and adware. Cyber attackers use malware as tools to infiltrate and damage devices and networks.
Drive-by attack
A drive-by download attack is an unintended download of malware, triggered by clicking on malicious links or visiting compromised websites. Attackers can plant these malicious links in emails or on legitimate websites, allowing them to install malware onto your devices without you noticing.
Denial of service (DoS)

Denial of Service (DoS) attacks aim to make your online services unavailable to your users. By flooding services with requests, an attacker can cause servers to overload and crash, rendering them inaccessible to legitimate users.

Zero-day attack
Zero-day attacks occur when a network or software weakness becomes weaponised by an attacker before the vendor has been able to distribute a security patch. Without proactive security measures, attackers can easily exploit these unpatched vulnerabilities.