Have an account?

  •   Personalized content
  •   Your products and support

Need an account?

Create an account

Cisco 2017 Annual Cybersecurity Report Graphics

Click the image or its link. Then use the Save As function to download it.

You can use the PNG images in a presentation, social media post, or any other way you like.

Figure 1 : Security Professionals Biggest Sources of Concern Related to Cyber Attacks

Download

Figure 2 : Most Commonly Observed Malware

Download

Figure 3: Most Commonly Observed Malware

Download

Figure 4: Explosive Growth of Connected Third Party Cloud Applications 2016

Download

Figure 5: Growth of Third Party Cloud Applications 3Year Over Year Comparison

Download

Figure 6: Third Party Applications Classified as High Risk

Download

Figure 7: Distribution of Low Medium and High Risk Applications by Region

Download

Figure 8: Distribution of Low Medium and High Risk Applications by Industry

Download

Figure 9: Identifying User Behavior Patterns with Automation

Download

Figure 10: Exploit Kit Landing Page Blocks 03 January November 2016

Download

Figure 11: Top Vulnerabilities in Exploit Kits

Download

Figure 12: Percentage of Organizations with Adware Infections

Download

Figure 13: Breakdown of Total Incidents by Adware Component

Download

Figure 14: IP Blocks by Country

Download

Figure 15: Total Spam Volume

Download

Figure 16: Overall Size of SCBL

Download

Figure 17: Percentage of Total Spam Containing 03Malicious

Download

Figure 18: Comparison of Hailstorm and Snowshoe Spam Attacks

Download

Figure 19: Top Threat Outbreak Alerts

Download

Figure 20: Sample of Observed Lower Volume Malware

Download

Figure 21: Percentage of Monthly Vertical Block Rates

Download

Figure 22: Web Blocks by Country

Download

Figure 23: Median TTD by Month

Download

Figure 24: TTD Medians of Top Malware Families

Download

Figure 25: File Extension and MIME Combinations for the Locky Family

Download

Figure 26: Hash Ages for the Locky Malware Family

Download

Figure 27: TTD for the Locky Malware Family

Download

Figure 28: File Extension and MIME Combinationsfor Nemucod

Download

Figure 29: Hash Ages for the Nemucod Malware Family

Download

Figure 30: TTD for the Nemucod Malware Family

Download

Figure 31: File Extension and MIME Combinations for Adwind RAT

Download

Figure 32: Hash Ages for the Adwind RAT Malware Family

Download

Figure 33: TTD for the Adwind RAT Malware Family

Download

Figure 34: File Extension and MIME Combinations for Kryptik

Download

Figure 35: Hash Ages for the Kryptik Malware Family and Percent of Total Hash Volume Observed Per Month

 

Download

Figure 36: TTD for Kryptik Malware Family

Download

Figure 37: Cumulative Annual Alert Totals

Download

Figure 38: Critical Vulnerability Advisories by Vendor and Type

Download

Figure 39: Selected Critical Vulnerability Advisories

Download

Figure 40: Client Server Vulnerabilities Breakdown 2015-2016

Download

Figure 41: Vulnerabilities Found in Middleware Libraries

Download

Figure 42: Time to Patch for Adobe Flash and Google Chrome

Download

Figure 43: Time to Patch for Firefox Silverlight and Java

Download

Figure 44: Percentages of Security Professionals Who Feel Their Security Infrastructure Is Up to Date

Download

Figure 45: Percentages of Security Professionals Who Perceive Various Security Tools to Be Highly Effective

Download

Figure 46: Percentages of Security Professionals Who Believe

Download

Figure 47: Biggest Obstacles to Security

Download

Figure 48: Number of Security Professionals Employed by Organizations

Download

Figure 49: Number of Security Professionals by Size of Organization

Download

Figure 50: Percentages of Respondents Who Strongly Agree

Download

Figure 51: Number of Security Vendors and Products Used by Organizations

Download

Figure 52: Percentages of Security Alerts That Are Not Investigated or Remediated

Download

Figure 53: Length and Extent of Outages Caused by Security Breaches

Download

Figure 54: Percentage of Organizations Experiencing a Public Breach

Download

Figure 55: Functions Most Likely to Be Affected by a Public Breach

Download

Figure 56: Percentage of Business Opportunity Lost as the Result of an Attack

Download

Figure 57: Percentage of Organizational Revenue Lost as the Result of an Attack

Download

Figure 58: Percentage of Customers Lost by Companies Due to Attacks

Download

Figure 59: How Security Breaches Drive Improvements

Download

Figure 60: Organizations Reliance on Outsourcing

Download

Figure 61: Percentage of Organizations Reliance on Outsourcing

Download

Figure 62: Sources of Increased Scrutiny

Download

Figure 63: How Trust and Cost Effectiveness Drive Security Decisions

Download

Figure 64: The Stages of the Value Chain

Download

Figure 65: Security Maturity and Growth Rates

Download

Figure 66: Security Maturity in Industry Verticals

Download

Figure 67: Security Maturity by Country

Download

Figure 68: Drivers and Safeguards for Minimizing Risk

Download