Story image

INFOGRAPHIC – The EU’s most vulnerable countries to cybercrime

06 Sep 17

​In today’s modern and digitally dangerous world it pays to know just how safe you are.

This isn’t surprising, considering the number of high-profile cyberattacks that have occurred in the first half of 2017 alone – we’ve had the WannaCry ransomware, the CloudBleed leaks and the potential exposure of voter records by hackers.

Cybersecurity comes down to a number of factors and one of them is as simple as geographical location, which is why Website Builder Expert used data from the EU, the ITU Global Cybersecurity Index, Microsoft and Rapid7 to determine which countries in the EU are the least vulnerable to cybercrime – and which countries are the most vulnerable.

The study looked into a number of factors to determine the vulnerability rankings of each country, including how many residents had already experienced cybercrime, how often residents are encountering malware and viruses each year, each nation’s commitment to cyber security initiatives, and how exposed internet connections were in each country.

Finland came out on top as the safest of the 28 countries with a vulnerability ranking of just 29 percent, followed by Estonia, Germany and Netherlands all on 30 percent.

The most vulnerable countries to cybercrime in the EU are Malta, Greece and Romania all with a 41 percent ranking.

The reason Malta found itself at the bottom of the pile was because of its exceptionally high percentage of exposed Internet connections (73 percent), lack of cybersecurity legislation and poor international cooperation.

This means that despite Malta’s population actually encountering slightly less cybercrime than their neighbours, they’re actually at far more risk in the in the road ahead because of a lack of protective or preventative measures in place.

Have a look at the infographic below to see the full list of the countries in the EU and their vulnerability rankings.

JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
Tensions on the rise after Huawei CFO arrest
“Recently our corporate CFO, Meng Wanzhou, was provisionally detained by the Canadian authorities on behalf of the United States of America."
Palo Alto Networks integrates RedLock and VM-Series with AWS Security Hub
AWS Security Hub is designed to provide users with a comprehensive view of their high-priority security alerts and compliance status.
Juniper simplifies data integration to improve threat detection
Updates to the Juniper Advanced Threat Prevention Appliances leverage third-party firewalls and security data sources.
Is mobile shopping compromising your enterprise security?
When employees do their holiday shopping on company resources, security teams have a challenge with the surge in browsing and online transactions.