In a world of ever-changing cyber threats, organisations must understand the nature of the latest exploits and how their networks are potentially impacted on.
Enterprises need to arm themselves with both cyber threat awareness and the appropriate security architecture to address these evolving challenges. The 2014 Security Report reveals the prevalence and growth of threats on enterprise networks, through information obtained over the course of 2013.
The report is based on collaborative research and in-depth analysis of over 200,000 hours of monitored network traffic, from more than 9,000 threat prevention gateways, across organisations in 122 countries.
Key findings include:
- Malware activity increased in speed and quantity: Overall malware activity grew dramatically year over year. The research found malicious software within 84% of the organisations under analysis; this malware was downloaded at an average rate of one every 10 minutes. In fact, 14% of organisations experienced a user downloading malware every two hours or less in 2012. This year, that number increased by over threefold to 58% of organisations.
- "Unknown" malware ruled the threat-scape: Smarter, sophisticated, and more resilient malware emerged in 2013. Check Point's Threat Emulation sensors revealed that 33% of organisations downloaded at least one infected file with unknown malware for the period between June and
- The bot infestation: Bot infections continued in prevalence, with a host infected by a bot every 24 hours. In 2013, at least one bot was detected in 73% of surveyed organisations, an increase from 63% in 2012. Organisations also struggled with containing bots. Check Point found that 77% of bots were active for more than four weeks. Bots also communicated with their Command and Control (C&C) every three minutes.
- Risky applications resulted in risky business: Use of high-risk applications continued to be on the rise in 2013, with torrents, anonymisers, peer-to-peer (P2P) file-sharing applications being used every nine minutes on an average day. P2P file sharing usage increased from 61% of organisations in 2012 to 75% in 2013. Additionally, 56% of organisations ran anonymiser proxy applications in 2013, up from 43% in 2012.
- Taking the "confident" out of confidential: Data loss was top of mind in 2013, with recent breaches and mass theft targeting consumer data at well-known brands like Target,
"Our 2014 Security Report provides a bird's-eye view into the degree of infiltration and sophistication of new threats. We found that organisations are often surprised by the severity of bot infections and the various threats that lurk on their networks," said
For a full copy, go to www.checkpoint.com/securityreport
All rights reserved.
Most Popular Stories
- Hernandez lawyer: Pats Records Dispute Resolved
- Congress Leaving Town as Deadlines Loom
- Oregon Voters to Decide on Recreational Pot
- 4th Circuit Upholds Obamacare Subsidies
- Fiat, Renault Strike Deal on New Light Vehicle
- Oregon to Vote on Recreational Marijuana
- Senate, House Locking Horns on Border Funds
- Jeter, Bauer Give Fox a Strong Week in TV Ratings
- LinkedIn to Buy Ad Tech Company Bizo for $175 Million
- A's Agree to 10-Year Lease to Stay in Oakland