Cyber security report 2020
Contenido multimedia no disponible por derechos de autor o por acceso restringido. Contacte con la institución para más información.
Tag | 1 | 2 | Valor |
---|---|---|---|
LDR | 00000cam a22000004b 4500 | ||
001 | MAP20200012733 | ||
003 | MAP | ||
005 | 20200420183405.0 | ||
008 | 200420s2020 esp|||| ||| ||spa d | ||
040 | $aMAP$bspa$dMAP | ||
084 | $a861 | ||
245 | 1 | 0 | $aCyber security report 2020 |
260 | $aTel Aviv$bCheck Point Software Technologies $c2020 | ||
300 | $a80 p. | ||
490 | 0 | $aCheck Point Research | |
520 | $aEach year, Check Point Research (CPR) reviews previous year cyber incidents to gather key insights about the global cyber threat landscape. In this 2020 Cyber Security Annual Report, we offer a review of 2019's major cyber incidents, suggest predictions for 2020, and recommend best practices to help keep your organization safe from cyber attacks. With the popularity of cloud computing and network-connected smartphones, it's no secret that there are more ways to invade an organization. A once hardened network perimeter is now blurred and porous to cyber attacks, and the bad actors are well aware. If there's one clear takeaway from 2019, it's that no organization, big or small, is immune from a devastating cyber attack. Cyber exploits are more sophisticated, illusive, and targeted than ever before. With cybercrime rates estimated to have generated US$1.5 trillion in 2018,1 navigating today's complex cyber threat landscape requires comprehensive cyber security. | ||
520 | $aExecutive summary: navigating the ver-changing contours of cyber security -- Timeline of 2019´s major cyber events -- 2020 vision: Check Point´s cyber security predictions -- 2019 cyber security trends -- Global malware statistics -- High-profile global vulnerabilities -- Review of 2019 cyber threat predictions -- Recommendations to prevent the next cyber attack -- Zero trust networks: best practices -- Appendix: malware family descriptions | ||
650 | 4 | $0MAPA20140022700$aCiberseguridad | |
650 | 4 | $0MAPA20080557515$aCibernética | |
650 | 4 | $0MAPA20140023066$aCiberataques | |
650 | 4 | $0MAPA20080603724$aSeguridad empresarial | |
650 | 4 | $0MAPA20080623517$aProtección de la información | |
650 | 4 | $0MAPA20080573577$aRecomendaciones | |
710 | 2 | $0MAPA20200008286$aCheck Point Software Technologies | |
830 | 0 | $0MAPA20200008293$aCheck Point Research |