30.05.2013 Views

internet security tHreAt rePOrt GOVernMent 2013

internet security tHreAt rePOrt GOVernMent 2013

internet security tHreAt rePOrt GOVernMent 2013

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

p. 119<br />

Symantec Corporation<br />

Internet Security Threat Report <strong>2013</strong> :: Volume 18<br />

SPAM AND FRAUD ACTIVITy TRENDS<br />

Analysis of Spam Activity by Geography, Industry Sector, and Company Size<br />

Background<br />

Spam activity trends can also reveal patterns that may be<br />

associated with particular geographical locations or hotspots.<br />

This may be a consequence of social and political changes in the<br />

region, such as increased broadband penetration and increased<br />

competition in the marketplace that can drive down prices,<br />

increasing adoption rates. Of course, there may also be other<br />

factors at work based on the local economic conditions that may<br />

present different risk factors. Similarly, the industry sector may<br />

also have an influence on an organization’s risk factor, where<br />

certain industries may be exposed to different levels of threat<br />

based on the nature of their business.<br />

Moreover, the size of an organization can also play a part in<br />

determining their exposure to risk. SMBs may find themselves<br />

Data<br />

Figure c.3. Proportion of Email Traffic Identified as Spam by Industry Sector, 2012<br />

Source: Symantec.cloud<br />

Marketing/Media<br />

Manufacturing<br />

Recreation<br />

Agriculture<br />

Chem/Pharm<br />

Building/Cons<br />

Telecoms<br />

IT Services<br />

Wholesale<br />

Professional Services<br />

the target of a spam attack because SMBs are perceived to be<br />

softer targets because they are less likely to have the same levels<br />

of <strong>security</strong> countermeasures as larger organizations, which are<br />

more likely to have greater budgetary expenditure applied to<br />

their anti-spam and <strong>security</strong> countermeasures.<br />

Methodology<br />

0 10 20 30 40 50 60 70 80 90%<br />

Analysis of spam activity based on geography, industry, and<br />

size is determined from the patterns of spam activity for<br />

Symantec.cloud clients for threats during 2012.<br />

2011 2012

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!