dell infographic cyber threats v6i.dell.com/.../en/documents/dell_infographic_cyber... · cyber...

1
The power to do more Cyber Threats: Safeguarding Your Business Take a proactive approach by helping secure your data and systems Small businesses are particularly vulnerable IT threats can be destructive close within six months of being victimized by a cyber crime 5 $200,000 It can cost more than 55 % 88 % 72 % CLOSED to respond to a data breach 4 Train your team Protect data, computers and networks Use passwords Provide firewall security Security features small businesses value most 6 Secure your mobile devices Back up important data Create user accounts Limit employee access to data Comprehensive intrusion prevention Anti-spam, anti-virus and anti-spyware protection Secure, flexible remote access Unhindered network performance Secure wireless connectivity Ease of setup and management The new Dell SonicWALL TZ Series is the most secure Unified Threat Management (UTM) firewall for small businesses, retail deployments, government organizations, remote sites and branch offices. SonicWALL provides: Secure your business with SonicWALL TM Learn more Check out this article and checklist to learn how to help secure your business from cyber threats, as well as examples of how businesses like yours could benefit from having a protected system. 67 % 48 % 47 % 45 % 25 % 18 % Backup and recovery Anti-spam and email security Network security Web application firewall Endpoint security Secure remote access How can you protect your business? OUT OF BUSINESS 60 % 1. Ponemon Institute research for Munich Re 2. Verizon 2013 Data Breach Investigations Report, p. 19 3. Verizon 2013 Data Breach Investigations Report, p. 12 4. Beazley Small Business Spotlight, p. 1, June 2012 5. Congressional Testimony, p. 2, March 2013 6. My Voice for Dell SonicWALL study, p. 7, April-May 2013 have experienced a security breach 1 of threats come from outside the business 2 of threats come in the form of hacking, followed by malware attacks (54%) 3

Upload: others

Post on 30-Jul-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Dell Infographic Cyber Threats v6i.dell.com/.../en/Documents/Dell_Infographic_Cyber... · Cyber Threats: Safeguarding Your Business Take a proactive approach by helping secure your

The power to do more

Cyber Threats Safeguarding Your Business

Take a proactive approach by helping secure your data and systems

Small businesses are particularly vulnerable

IT threats can be destructive

close within six months of being victimized by a cyber crime5

$200000 It can cost more than

55

88 72

CLOSED to respond to a data breach4

Train your team Protect data computers and networks Use passwords Provide firewall security

Security features small businessesvalue most6

Secure your mobile devices Back up important data Create user accounts Limit employee access to data

Comprehensive intrusion prevention

Anti-spam anti-virus and anti-spyware protection

Secure flexible remote access

Unhindered network performance

Secure wireless connectivity

Ease of setup and management

The new Delltrade SonicWALLtrade TZ Series is the most secure Unified Threat Management (UTM) firewall for small businesses retail deployments government organizations remote sites and branch offices SonicWALL provides

Secure your business with SonicWALL

TM

Learn more

Check out this article and checklist to learn how to help secure your business from cyber threats as well as examples of how businesses like yours could benefit from having a protected system

67

48

47

45

25

18

Backup and recovery

Anti-spam and email security

Network security

Web application firewall

Endpoint security

Secure remote access

How can you protect your business

OUT OF BUSINESS

60

1 Ponemon Institute research for Munich Re 2 Verizon 2013 Data Breach Investigations Report p 19 3 Verizon 2013 Data Breach Investigations Report p 12

4 Beazley Small Business Spotlight p 1 June 2012 5 Congressional Testimony p 2 March 2013 6 My Voice for Dell SonicWALL study p 7 April-May 2013

have experienced a security breach1

of threats come from outside the business2

of threats come in the form of hacking followed by malware attacks (54)3