Guest

Cisco 2017 Annual Cybersecurity Report Graphics

Click the image or its link. Then use the Save As function to download it.

You can use the PNG images in a presentation, social media post, or any other way you like.

Figure 1 : Security Professionals Biggest Sources of Concern Related to Cyber Attacks

Download

Figure 2 : Most Commonly Observed Malware

Download

Figure 3: Most Commonly Observed Malware

Download

Figure 4: Explosive Growth of Connected Third Party Cloud Applications 2016

Download

Figure 5: Growth of Third Party Cloud Applications 3Year Over Year Comparison

Download

Figure 6: Third Party Applications Classified as High Risk

Download

Figure 7: Distribution of Low Medium and High Risk Applications by Region

Download

Figure 8: Distribution of Low Medium and High Risk Applications by Industry

Download

Figure 9: Identifying User Behavior Patterns with Automation

Download

Figure 10: Exploit Kit Landing Page Blocks 03 January November 2016

Download

Figure 11: Top Vulnerabilities in Exploit Kits

Download

Figure 12: Percentage of Organizations with Adware Infections

Download

Figure 13: Breakdown of Total Incidents by Adware Component

Download

Figure 14: IP Blocks by Country

Download

Figure 15: Total Spam Volume

Download

Figure 16: Overall Size of SCBL

Download

Figure 17: Percentage of Total Spam Containing 03Malicious

Download

Figure 18: Comparison of Hailstorm and Snowshoe Spam Attacks

Download

Figure 19: Top Threat Outbreak Alerts

Download

Figure 20: Sample of Observed Lower Volume Malware

Download

Figure 21: Percentage of Monthly Vertical Block Rates

Download

Figure 22: Web Blocks by Country

Download

Figure 23: Median TTD by Month

Download

Figure 24: TTD Medians of Top Malware Families

Download

Figure 25: File Extension and MIME Combinations for the Locky Family

Download

Figure 26: Hash Ages for the Locky Malware Family

Download

Figure 27: TTD for the Locky Malware Family

Download

Figure 28: File Extension and MIME Combinationsfor Nemucod

Download

Figure 29: Hash Ages for the Nemucod Malware Family

Download

Figure 30: TTD for the Nemucod Malware Family

Download

Figure 31: File Extension and MIME Combinations for Adwind RAT

Download

Figure 32: Hash Ages for the Adwind RAT Malware Family

Download

Figure 33: TTD for the Adwind RAT Malware Family

Download

Figure 34: File Extension and MIME Combinations for Kryptik

Download

Figure 35: Hash Ages for the Kryptik Malware Family and Percent of Total Hash Volume Observed Per Month

 

Download

Figure 36: TTD for Kryptik Malware Family

Download

Figure 37: Cumulative Annual Alert Totals

Download

Figure 38: Critical Vulnerability Advisories by Vendor and Type

Download

Figure 39: Selected Critical Vulnerability Advisories

Download

Figure 40: Client Server Vulnerabilities Breakdown 2015-2016

Download

Figure 41: Vulnerabilities Found in Middleware Libraries

Download

Figure 42: Time to Patch for Adobe Flash and Google Chrome

Download

Figure 43: Time to Patch for Firefox Silverlight and Java

Download

Figure 44: Percentages of Security Professionals Who Feel Their Security Infrastructure Is Up to Date

Download

Figure 45: Percentages of Security Professionals Who Perceive Various Security Tools to Be Highly Effective

Download

Figure 46: Percentages of Security Professionals Who Believe

Download

Figure 47: Biggest Obstacles to Security

Download

Figure 48: Number of Security Professionals Employed by Organizations

Download

Figure 49: Number of Security Professionals by Size of Organization

Download

Figure 50: Percentages of Respondents Who Strongly Agree

Download

Figure 51: Number of Security Vendors and Products Used by Organizations

Download

Figure 52: Percentages of Security Alerts That Are Not Investigated or Remediated

Download

Figure 53: Length and Extent of Outages Caused by Security Breaches

Download

Figure 54: Percentage of Organizations Experiencing a Public Breach

Download

Figure 55: Functions Most Likely to Be Affected by a Public Breach

Download

Figure 56: Percentage of Business Opportunity Lost as the Result of an Attack

Download

Figure 57: Percentage of Organizational Revenue Lost as the Result of an Attack

Download

Figure 58: Percentage of Customers Lost by Companies Due to Attacks

Download

Figure 59: How Security Breaches Drive Improvements

Download

Figure 60: Organizations Reliance on Outsourcing

Download

Figure 61: Percentage of Organizations Reliance on Outsourcing

Download

Figure 62: Sources of Increased Scrutiny

Download

Figure 63: How Trust and Cost Effectiveness Drive Security Decisions

Download

Figure 64: The Stages of the Value Chain

Download

Figure 65: Security Maturity and Growth Rates

Download

Figure 66: Security Maturity in Industry Verticals

Download

Figure 67: Security Maturity by Country

Download

Figure 68: Drivers and Safeguards for Minimizing Risk

Download