Known and Unknown Malware Continues to Grow

 
 
By Karen A. Frenkel  |  Posted 08-03-2015 Email
 
 
 
 
 
 
 
 
 
  • Previous
    Known and Unknown Malware Continues to Grow
    Next

    Known and Unknown Malware Continues to Grow

    A new study reveals 48 times more malware downloads this year compared to last year.
  • Previous
    Exponential Increase in Unknown Malware
    Next

    Exponential Increase in Unknown Malware

    Last year, 106 unknown malware variants hit an organization every hour. That's 48 times more than the 2.2 downloads per hour reported in 2013.
  • Previous
    Bots Accelerate the Spread of Malware
    Next

    Bots Accelerate the Spread of Malware

    Cyber-criminals continue to use bots to amplify and accelerate the spread of malware. 83% of organizations studied were infected with bots in 2014, enabling constant communication and data sharing between bots and command-and-control servers.
  • Previous
    Mobile Devices Are the Biggest Vulnerability
    Next

    Mobile Devices Are the Biggest Vulnerability

    Mobile devices provide easier direct access to more valuable organizational assets than any other intrusion point.
  • Previous
    Probability of Infected Mobile Device
    Next

    Probability of Infected Mobile Device

    An organization that has more than 2,000 devices on its network has a 50% chance of at least six infected or targeted mobile devices on that network.
  • Previous
    Top Mobile Challenge: Securing Corporate Info
    Next

    Top Mobile Challenge: Securing Corporate Info

    72% of IT providers agree that their top mobile security challenge is to secure corporate information.
  • Previous
    Second Top Challenge: Personal Devices
    Next

    Second Top Challenge: Personal Devices

    67% of respondents said the second biggest challenge is managing personal devices that store both corporate and personal data.
  • Previous
    High Price of Risky Apps
    Next

    High Price of Risky Apps

    Applications become points of entry, rendering businesses vulnerable. Some, like file sharing, are obviously risky. The rise of shadow IT and applications that central IT does not sponsor or support have all led to even riskier business.
  • Previous
    Use of High-Risk Apps Is Rising
    Next

    Use of High-Risk Apps Is Rising

    96% of organizations studied used at least one high-risk application in 2014, a 10-point increase from 2013. 12.7 high-risk application events occur every hour.
  • Previous
    Data Loss Is a Top Concern
    Next

    Data Loss Is a Top Concern

    81% of participating organizations suffered a data loss incident, up 41% from 2013. While most security strategies focus on protecting data from hackers who enter from the outside, it's equally important to protect data from the inside.
 

A huge increase in zero-day attacks in 2014 on enterprise networks and mobile devices slammed companies, according to a new report by Check Point Research. There were 106 downloads of malware per hour compared to 2.2 per hour in 2013. "Only by arming themselves with a combination of knowledge and strong security solutions can organizations truly protect themselves against these evolving threats," said Amnon Bar-Lev, president of Check Point Software Technologies, "By making security a critical asset to your business, you can turn security into an enabler [so that you] unlock innovation and foster an environment for high performance and productivity." The report, "Check Point 2015 Security Report," provides insight into major security events which organizations experienced and recommends how to prevent them. The study is an in-depth analysis of security events found at 1,300 businesses in all industries worldwide. They were discovered through Check Point ThreatCloud, which is connected to security gateways of 16,000 organizations and 3,000 other gateways reporting to Check Point Threat Emulation Cloud. The report analyzed 300,000 hours of monitored network traffic and 1 million smartphones.

 
 
 
 
 
Karen A. Frenkel writes about technology and innovation and lives in New York City.

 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login Register