the rise of california cybercrime

15
The Rise of California Cybercrime PROTECTING CUSTOMERS WITH ADAPTIVE AUTHENTICATION

Upload: secureauth

Post on 10-Jan-2017

350 views

Category:

Software


0 download

TRANSCRIPT

Page 1: The Rise of California Cybercrime

The Rise of California Cybercrime

PROTECTING CUSTOMERS WITH ADAPTIVE AUTHENTICATION

Page 2: The Rise of California Cybercrime

The StatisticsSince 2012, businesses and government agencies have been required to notify the Attorney General on breaches affecting more than 500 Californians.+ In the past four years:

– 657 Data breaches– Affect 49 million records of Californians– 2012: 131 breaches – 2015: 178 breaches (36% increase)– 2012: 2.6M records at risk – 2015: 24M records at risk (Over a 900% increase)

• 24M records = nearly 3 in 5 Californians were victim of data breach in 2015 alone

+ All parts of economy are affected!– Retailers, Banks, healthcare providers, spas, hotels, restaurants, gov’t agencies,

schools, and more!+ Read for yourself

Cybercrime Storm Clouds Brewing in California From 2012 – 2015:• 36% increase in breaches • 900% increase in records impacted• 657 Data breaches & 49 million records of

Californians

Nearly 3 out of 5 California residents were victims of a data breach last year.

Page 3: The Rise of California Cybercrime

What’s Getting Stolen?

67% of U.S. breach victims in 2014 were also victims of fraud.

Social Security Numbers

Birthdates

Driver License

Data

Payment Card Numbers

Insurance & Income

Data

Page 4: The Rise of California Cybercrime

Emerging Trends = Higher Risk

Internet of ThingsBYODCloud AppsBig Data

Page 5: The Rise of California Cybercrime

IT teams are struggling to keep up with new technologies & sophisticated cybercriminals.

Page 6: The Rise of California Cybercrime

Malware & Hacking: Cybercrime Kings

+ 54% of breaches+ 90% of all records impacted+ ALL breaches impacting more

than 1 million records

Page 7: The Rise of California Cybercrime

Passwords alone can’t keep hackers out.

Page 8: The Rise of California Cybercrime

Why don’t passwords work?• Weak and guessable• Identical across multiple accounts• Not changed often enough• Open the door to portals across the

Internet

Page 9: The Rise of California Cybercrime

#1 California Recommendation:

• Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

• Controlled Use of Administrative Privileges • Maintenance, Monitoring, and Analysis of Audit Logs • Email and Web Browser Protections • Boundary Defense • Data Protection • Controlled Access Based on the Need to Know • Application Software Security

SecureAuth solutions meet almost half the 20 controls

Center for Internet Security’s Critical Security Controls

Page 10: The Rise of California Cybercrime

#2 California Recommendation:

“Organizations should make multi-factor authentication available on consumer-facing online accounts that contain sensitive personal information. This stronger procedure would provide greater protection than just the username-and-password combination for personal accounts such as online shopping accounts, health care websites and patient portals, and web-based email accounts.” - Attorney General Kamala D. Harris

“something you know” + “something you have” + “something you are” (password or PIN) (cellphone or token) (keystroke pattern)

Multi-factor Authentication

Page 11: The Rise of California Cybercrime

SecureAuth IdP stops hackers in their tracks – even when they have valid passwords.

SecureAuth delivers secure, flexible, adaptive two-factor authentication. Organizations can offer a swift and convenient user experience while monitoring user behavior to identify suspicious actors in network - protecting their resources and data.

Page 12: The Rise of California Cybercrime

SecureAuth IdP: Multi-factor Authentication

• Over 20 two-factor authentication methods• SMS• telephony and e-mail OTPs• push notification• OATH tokens• social network IDs• device fingerprints• traditional smartcards and tokens

• Works seamlessly with workflow and user experience• Deploys right into your current infrastructure

Page 13: The Rise of California Cybercrime

SecureAuth IdP: Adaptive Authentication

+ Validates user identity behind the scenes+ Uses device fingerprinting, geo-velocity, geo-

location and geo-fencing or comparing IP addresses

+ Takes security to a higher level without adding friction

Page 14: The Rise of California Cybercrime

SecureAuth IdP: Behavioral Biometrics

+ Measure & record user nuances & microbehaviors

+ Compares those patterns to approve or deny authentication

+ Almost impossible for a hacker to duplicate

Page 15: The Rise of California Cybercrime

Protect your California business with secure access solutions that stop criminals and safeguard your reputation, your data and your customers.

Request a SecureAuth IdP demo today.