Thursday, 4 June 2015

‘Sophisticated and Ruthless’ Hackers Increase Their Impact on Businesses

Organizations around the world are enhancing productivity through increased mobility, virtualization and other technologies. And cybercriminals couldn’t be happier.

Check Point Software Technologies’ 2015 Security Report shows an alarming increase in attacks using malware and bots. While organizations have adopted new tools to increase productivity, they’ve often forgotten about the resulting security implications.

The report is based on research and analysis of more than 300,000 hours of monitored network traffic, from more than 16,000 threat prevention gateways and 1 million smartphones.

In addition, a new study by the Ponemon Institute reveals the average cost of a data breach has increased from $5.4 million to $5.9 million, ending a two-year downward trend. The study examines the costs incurred by 61 U.S. companies in 16 industry sectors.

Some 106 unknown malware hit an organization every hour, 48 times more than the 2.2 downloads per hour reported in 2013, according to Check Point’s report. Also, 83 percent of organizations studied were infected with bots in 2014, allowing constant communication and data sharing between the bots and their command and control servers.

“Today’s cybercriminals are sophisticated and ruthless: They prey on the weaknesses in a network, approaching any security layer as an open invitation to try to hack it,” said Amnon Bar-Lev, Check Point’s president. “In order to protect themselves against attacks, security professionals and organizations alike must understand the nature of the latest exploits and how their networks are potentially impacted.”

Mobile devices are providing easier direct access to more valuable organizational assets than any other intrusion point. Organizations with more than 2,000 devices on their networks face a 50 percent chance that at least six of those devices have been infected or targeted by cybercriminals.

Among IT providers, 72 percent agreed that their top mobile security challenge is securing corporate information, while 67 percent said their second-biggest challenge is managing personal devices storing both corporate and personal data.

High-risk applications are creating opportunities for cybercriminals to access the corporate network, with 96 percent of organizations studied using at least one high-risk application in 2014, a 10 point increase from 2013. Check Point also revealed that nearly 13 high-risk application events happen every hour.

View the original content and more from this author here: http://ift.tt/1FWTbDS



from hacker samurai http://ift.tt/1G9APRr
via IFTTT

No comments:

Post a Comment