SHARE
Facebook X Pinterest WhatsApp

Known and Unknown Malware Continues to Grow

Aug 3, 2015

Known and Unknown Malware Continues to Grow

Known and Unknown Malware Continues to GrowKnown and Unknown Malware Continues to Grow

A new study reveals 48 times more malware downloads this year compared to last year.

Exponential Increase in Unknown MalwareExponential Increase in Unknown Malware

Last year, 106 unknown malware variants hit an organization every hour. That’s 48 times more than the 2.2 downloads per hour reported in 2013.

Bots Accelerate the Spread of MalwareBots Accelerate the Spread of Malware

Cyber-criminals continue to use bots to amplify and accelerate the spread of malware. 83% of organizations studied were infected with bots in 2014, enabling constant communication and data sharing between bots and command-and-control servers.

Mobile Devices Are the Biggest VulnerabilityMobile Devices Are the Biggest Vulnerability

Mobile devices provide easier direct access to more valuable organizational assets than any other intrusion point.

Probability of Infected Mobile DeviceProbability of Infected Mobile Device

An organization that has more than 2,000 devices on its network has a 50% chance of at least six infected or targeted mobile devices on that network.

Top Mobile Challenge: Securing Corporate InfoTop Mobile Challenge: Securing Corporate Info

72% of IT providers agree that their top mobile security challenge is to secure corporate information.

Second Top Challenge: Personal DevicesSecond Top Challenge: Personal Devices

67% of respondents said the second biggest challenge is managing personal devices that store both corporate and personal data.

High Price of Risky AppsHigh Price of Risky Apps

Applications become points of entry, rendering businesses vulnerable. Some, like file sharing, are obviously risky. The rise of shadow IT and applications that central IT does not sponsor or support have all led to even riskier business.

Use of High-Risk Apps Is RisingUse of High-Risk Apps Is Rising

96% of organizations studied used at least one high-risk application in 2014, a 10-point increase from 2013. 12.7 high-risk application events occur every hour.

Data Loss Is a Top ConcernData Loss Is a Top Concern

81% of participating organizations suffered a data loss incident, up 41% from 2013. While most security strategies focus on protecting data from hackers who enter from the outside, it’s equally important to protect data from the inside.

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.