![](https://static.wixstatic.com/media/21466f_4e7622cc2b9a43e8ac7c7476f1fbe157f000.jpg/v1/fill/w_948,h_533,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/21466f_4e7622cc2b9a43e8ac7c7476f1fbe157f000.jpg)
![Artboard 1 copy 2.png](https://static.wixstatic.com/media/21466f_e29194bafb65408dbaba471f771f1a7c~mv2.png/v1/fill/w_201,h_142,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/Artboard%201%20copy%202.png)
SECURITY PROGRAM
![](https://static.wixstatic.com/media/21466f_eb6fafae6901427486d6fb727cf4be27~mv2.jpg/v1/fill/w_980,h_342,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/21466f_eb6fafae6901427486d6fb727cf4be27~mv2.jpg)
Interesting Facts
HACKERS
![centang-3.png](https://static.wixstatic.com/media/21466f_87f71a20e3054518b3809f0097dd9246~mv2.png/v1/fill/w_15,h_15,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/centang-3.png)
The vast majority are under the age of 34
![centang-3.png](https://static.wixstatic.com/media/21466f_87f71a20e3054518b3809f0097dd9246~mv2.png/v1/fill/w_15,h_15,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/centang-3.png)
72% hack for money
![centang-3.png](https://static.wixstatic.com/media/21466f_87f71a20e3054518b3809f0097dd9246~mv2.png/v1/fill/w_15,h_15,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/centang-3.png)
40% also hack for fun
![centang-3.png](https://static.wixstatic.com/media/21466f_87f71a20e3054518b3809f0097dd9246~mv2.png/v1/fill/w_15,h_15,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/centang-3.png)
66% thrive on the challenge alone
![centang-3.png](https://static.wixstatic.com/media/21466f_87f71a20e3054518b3809f0097dd9246~mv2.png/v1/fill/w_15,h_15,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/centang-3.png)
50% claim to do good in the world through their hacking activities
![centang-3.png](https://static.wixstatic.com/media/21466f_87f71a20e3054518b3809f0097dd9246~mv2.png/v1/fill/w_15,h_15,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/centang-3.png)
The United States and Russia have their highest concentration of free lance hackers
![centang-3.png](https://static.wixstatic.com/media/21466f_87f71a20e3054518b3809f0097dd9246~mv2.png/v1/fill/w_15,h_15,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/centang-3.png)
17% use hacking as their sole source of income
![centang-3.png](https://static.wixstatic.com/media/21466f_87f71a20e3054518b3809f0097dd9246~mv2.png/v1/fill/w_15,h_15,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/centang-3.png)
26% generate ¾ of their income from bug bounty programs
![centang-3.png](https://static.wixstatic.com/media/21466f_87f71a20e3054518b3809f0097dd9246~mv2.png/v1/fill/w_15,h_15,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/centang-3.png)
Hackers make anywhere from $20K to $350K from a single bug bounty program
![centang-3.png](https://static.wixstatic.com/media/21466f_87f71a20e3054518b3809f0097dd9246~mv2.png/v1/fill/w_15,h_15,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/centang-3.png)
98% are male
![hacker-working-darkness.jpg](https://static.wixstatic.com/media/21466f_b9b232ef01b9475489c3110ec636c4cb~mv2.jpg/v1/fill/w_980,h_551,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/21466f_b9b232ef01b9475489c3110ec636c4cb~mv2.jpg)
Cybersecurity Holistic Approach
Many organizations think that by installing a firewall and creating a DMZ they have established a safe security stance.
Unfortunately, the reality is that all the greatest and latest network and perimeter devices in the world will not slow down a persistent hacker if the software is not addressed as well.
​
Although network devices are important they cannot provide a holistic protection and handle the wide range of attacks from hackers.
![abstract-digital-technology-background-w](https://static.wixstatic.com/media/21466f_3d618e92ebe34d9d973ad5a8c264e59b~mv2.png/v1/fill/w_350,h_566,al_c,lg_1,q_85,enc_avif,quality_auto/abstract-digital-technology-background-w.png)