Cyber security report 2020
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
<record>
<leader>00000cam a22000004b 4500</leader>
<controlfield tag="001">MAP20200012733</controlfield>
<controlfield tag="003">MAP</controlfield>
<controlfield tag="005">20200420183405.0</controlfield>
<controlfield tag="008">200420s2020 esp|||| ||| ||spa d</controlfield>
<datafield tag="040" ind1=" " ind2=" ">
<subfield code="a">MAP</subfield>
<subfield code="b">spa</subfield>
<subfield code="d">MAP</subfield>
</datafield>
<datafield tag="084" ind1=" " ind2=" ">
<subfield code="a">861</subfield>
</datafield>
<datafield tag="245" ind1="1" ind2="0">
<subfield code="a">Cyber security report 2020</subfield>
</datafield>
<datafield tag="260" ind1=" " ind2=" ">
<subfield code="a">Tel Aviv</subfield>
<subfield code="b">Check Point Software Technologies </subfield>
<subfield code="c">2020</subfield>
</datafield>
<datafield tag="300" ind1=" " ind2=" ">
<subfield code="a">80 p.</subfield>
</datafield>
<datafield tag="490" ind1="0" ind2=" ">
<subfield code="a">Check Point Research</subfield>
</datafield>
<datafield tag="520" ind1=" " ind2=" ">
<subfield code="a">Each year, Check Point Research (CPR) reviews previous year cyber incidents to gather key insights about the global cyber threat landscape. In this 2020 Cyber Security Annual Report, we offer a review of 2019's major cyber incidents, suggest predictions for 2020, and recommend best practices to help keep your organization safe from cyber attacks. With the popularity of cloud computing and network-connected smartphones, it's no secret that there are more ways to invade an organization. A once hardened network perimeter is now blurred and porous to cyber attacks, and the bad actors are well aware. If there's one clear takeaway from 2019, it's that no organization, big or small, is immune from a devastating cyber attack. Cyber exploits are more sophisticated, illusive, and targeted than ever before. With cybercrime rates estimated to have generated US$1.5 trillion in 2018,1 navigating today's complex cyber threat landscape requires comprehensive cyber security.</subfield>
</datafield>
<datafield tag="520" ind1=" " ind2=" ">
<subfield code="a">Executive summary: navigating the ver-changing contours of cyber security -- Timeline of 2019´s major cyber events -- 2020 vision: Check Point´s cyber security predictions -- 2019 cyber security trends -- Global malware statistics -- High-profile global vulnerabilities -- Review of 2019 cyber threat predictions -- Recommendations to prevent the next cyber attack -- Zero trust networks: best practices -- Appendix: malware family descriptions</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20140022700</subfield>
<subfield code="a">Ciberseguridad</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080557515</subfield>
<subfield code="a">Cibernética</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20140023066</subfield>
<subfield code="a">Ciberataques</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080603724</subfield>
<subfield code="a">Seguridad empresarial</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080623517</subfield>
<subfield code="a">Protección de la información</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080573577</subfield>
<subfield code="a">Recomendaciones</subfield>
</datafield>
<datafield tag="710" ind1="2" ind2=" ">
<subfield code="0">MAPA20200008286</subfield>
<subfield code="a">Check Point Software Technologies </subfield>
</datafield>
<datafield tag="830" ind1=" " ind2="0">
<subfield code="0">MAPA20200008293</subfield>
<subfield code="a">Check Point Research</subfield>
</datafield>
</record>
</collection>