{"id":332,"date":"2014-12-11T08:47:09","date_gmt":"2014-12-11T08:47:09","guid":{"rendered":"http:\/\/felhoszolgaltatas-blog.hu\/en\/?page_id=332"},"modified":"2016-05-04T11:31:29","modified_gmt":"2016-05-04T11:31:29","slug":"threat-landscape-in-europe-2014","status":"publish","type":"page","link":"http:\/\/felhoszolgaltatas-blog.hu\/en\/ez-egy-minta-oldal\/threat-landscape-in-europe-2014\/","title":{"rendered":"Threat landscape in Europe 2014"},"content":{"rendered":"<p>The Kaspersky Lap held a Cyber Security Weekend conference in Warsaw, where they explored the latest cybercrime trend and discussed how European businesses can survive in a world of cyber security threats.<\/p>\n<p>The experts also presented an overview of the <strong>threat landscape in Europe in 2014<\/strong> based on details of how many Kaspersky Security Network users faced <strong>web-related and local threats<\/strong> These numbers varied greatly: for example 47% of users in Turkey and 42.8% &#8211; in Ukraine faced local threats, while in the Netherlands 18.1% encountered malicious activity online. Hungary 21,8 % and 27,8 % of users faced web-related and local threats, which means that approximately every four user has faced some unexpected event or harmful software.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-nsm-1-1278\" src=\"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-content\/uploads\/2014\/12\/Cyber_Security_Threat_Landscape_in_Europe-10-256299.png\" alt=\"\" width=\"830\" height=\"519\" \/><\/p>\n<p>Among the <strong>predictions of future threats<\/strong> the experts discussed the possibility of today\u2019s big cyber threat actors splintering into smaller, independent units. That would lead to a more widespread attack base with more diverse attacks coming from more sources. Experts believe that 2015 will bring <strong>more attacks against ATMs and payment systems, more malware incidents<\/strong> where banks are breached using methods coming directly from the targeted cyber-attack playbook. More incidents compromising the Internet of Things will most probably appear, and there may be more Internet-bleeding crises: dangerous vulnerabilities might be found in old code, exposing the Internet infrastructure to menacing attacks.<\/p>\n<p>Javier Egea the expert from European Cybercrime Centre at Europol said, that today the cybercrime is reaching across geographical boundaries. \u201c<em>We work all over Europe. But to successfully disrupt existing criminal organizations, there should be joint efforts of organizations like ours, of law enforcement agencies and private industry, including businesses that face threats and are ready to report on them\u201d, <\/em>he added.<\/p>\n<p>Advice on how <strong>small companies can secure their businesses<\/strong> was a special topic of the event. Small businesses often believe that they are too insignificant to attract the interest of cybercriminals, wrongly assuming that crooks want to chase bigger, wealthier organizations. But this complacent attitude offers cybercriminals a great opportunity for easy money.<\/p>\n<p>This carelessness can cost a huge amount of money or even lead to the closure of a business. The 2014 survey figures showed that the\u00a0 average cost of a data breach in a small or medium sized business can reach $47,000 worldwide; in Western Europe the figure climbs to $55,000. This includes:<\/p>\n<ul>\n<li>lost business opportunities,<\/li>\n<li>hiring external IT support to fix the problem and<\/li>\n<li>potentially even new equipment.<\/li>\n<\/ul>\n<p>The costs are not just financial: 57% of data loss events had a knock-on effect that damaged the operation of the business. A company\u2019s image and reputation \u2013 something that absorbs so much time and effort when developing marketing strategies \u2013 can be ruined overnight. More than half of lost data events (56%) have a negative impact on a company\u2019s reputation or perceived reliability.<\/p>\n<p>To avoid falling victim to cybercrime, companies are advised to use effective and comprehensive security solutions that meet their needs and allow them to easily manage the whole IT infrastructure. They can focus on the security issues that are critical to the individual company or to the field it works in, and pick a security vendor that can scale up as their business grows.<\/p>\n<p>Source: <a href=\"http:\/\/kaspersky.com\" target=\"_blank\"><span style=\"color: #3366ff;\">www.kaspersky.com<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Kaspersky Lap held a Cyber Security Weekend conference in Warsaw, where they explored the latest cybercrime trend and discussed how European businesses can survive in a world of cyber security threats. The experts also presented an overview of the &hellip; <a href=\"http:\/\/felhoszolgaltatas-blog.hu\/en\/ez-egy-minta-oldal\/threat-landscape-in-europe-2014\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"parent":2,"menu_order":58,"comment_status":"closed","ping_status":"open","template":"","meta":{"spay_email":""},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P79beE-5m","_links":{"self":[{"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/pages\/332"}],"collection":[{"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/comments?post=332"}],"version-history":[{"count":5,"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/pages\/332\/revisions"}],"predecessor-version":[{"id":602,"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/pages\/332\/revisions\/602"}],"up":[{"embeddable":true,"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/pages\/2"}],"wp:attachment":[{"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/media?parent=332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}