There are thousands of highly skilled computer professionals working full time at ILLEGALLY ACCESSING VALUABLE DATA that belongs to others.
It’s no longer a question of whether your organization’s network will be breached, but WHEN.
Once these hackers have found a target, they will ATTACK THEM FROM MULTIPLE DIRECTIONS until they find a way in.
Hackers are targeting him because he has access to a large amount of his company’s sensitive data.
Hackers can clone any website and easily penetrate benign sites like nonprofits that don’t have IT security budgets. Since Tom visits this site frequently, hackers have infiltrated it in an attempt to capture his personal data.
Tom is working from home today and is filling out a form with sensitive company data, including financials and account numbers.
The hackers’ attempt “form-grabbing,” a tactic that captures information entered into fields before it can be encrypted. They assume Tom’s company’s firewall won’t adequately protect him at home.
1. National Cyber-Forensics and Training Alliance
2. Tripwire, February 24, 2014
Tom hops into a local café to connect to the free wifi to check his work email on his mobile phone. He logs in and starts scanning his inbox. Oh no! A hacker on the same wifi connection was able to track Tom’s keystrokes and now has his login credentials as well as access to his company’s network.
1.Consumer Reports, April 17, 2014
2. Arxan, December 11, 2013
The attack vectors vary with device and locale, but the result is the same whether at work, at home, or on the move.
FOR BUSINESSES: Your IT department cannot handle a breach on its own
Disaster response plans are a mandatory part of your cyber-risk management program
Educate your employees on best risk-management practices FOR YOU: Update your antivirus software regularly
Strengthen your passwords and encrypt all personally identifiable information
Ensure your firewalls are in place before logging on

This infographic is provided for informational purposes only. Zurich assumes no liability concerning the information set forth above.