Cyberattacks in general and Cyber Crime in particularly have grown exponentially over the years and continue to do so. Cybersecurity spending has gone up in multiples however this only serves to keep the threat at bay, not to mention that Cybersecurity is an ongoing process, not an activity with an end.
In the year 2016, Govt of India's Nodal and National Cybersecurity Incident Management & Advisory Agency, CERT-In, reported a total of 50362 incidents. The types of incidents handled were Website Intrusion & Malware Propagation, Malicious Code, Phishing, Distributed Denial of Service attacks, Website Defacements and Unauthorized Scanning activities. In addition, 57262 spam incidents were also reported to CERT-In.
|Security Incidents handled||50362|
|Indian Website Defacements tracked||31664|
|Bot Infected Systems tracked||10020947|
|Security Incidents||Incident Count|
|Network Scanning / Probing||416|
|Virus/ Malicious Code||13371|
|Website Intrusion & Malware Propagation||1483|
Let us not lose perspective on the fact that these were only the reported incidents. Lakhs of Cyber incidents go unreported to the nodal agency until effective communication & co-ordination mechanisms are brought into play.
The global cost of cybercrime will reach $2 trillion by 2019.
According to the Ponemon Institute’s “2016 Cost of Data Breach Study: Global Analysis,” which queried 383 organizations that suffered at least one breach in 2016, the average cost per breach was $4 million. That figure rose to $7 million in the U.S.
The financial hit resulting from theft of trade secrets ranges from 1 percent to 3 percent of an entire nation’s gross domestic product (GDP), according to IDG’s “Global State of Information Security Survey 2016.”
According to Keeper Security’s “The State of SMB Cybersecurity” report, a staggering 50 percent of small and midsized organizations reported suffering at least one cyberattack in the last 12 months.
Our Services are designed to help take the sting away from your losses. These cover Defensive approaches as well as Legal Offensives to ensure that your adversary's continued attempts to infiltrate are stemmed.