

SECURITY PROGRAM

Interesting Facts
HACKERS

The vast majority are under the age of 34

72% hack for money

40% also hack for fun

66% thrive on the challenge alone

50% claim to do good in the world through their hacking activities

The United States and Russia have their highest concentration of free lance hackers

17% use hacking as their sole source of income

26% generate ¾ of their income from bug bounty programs

Hackers make anywhere from $20K to $350K from a single bug bounty program

98% are male

Cybersecurity Holistic Approach
Many organizations think that by installing a firewall and creating a DMZ they have established a safe security stance.
Unfortunately, the reality is that all the greatest and latest network and perimeter devices in the world will not slow down a persistent hacker if the software is not addressed as well.
​
Although network devices are important they cannot provide a holistic protection and handle the wide range of attacks from hackers.
