WELCOME TO THE CONTINUITY CENTRAL ARCHIVE SITE

Please note that this is a page from a previous version of Continuity Central and is no longer being updated.

To see the latest business continuity news, jobs and information click here.

Business continuity information

Check Point 2014 Security Report identifies ‘exponential increase in new and unknown malware on enterprise networks’

Check Point has issued its 2014 Security Report, its second annual report uncovering the major security events that occurred and impacted organizations across the world in 2013. The report is based on analysis of monitored security events from over 10,000 organizations worldwide, across a range of industry sectors. It shows the network security events that actually occurred within firms during 2013, and the security risks that companies are exposed to.

Key findings include:

Malware activity increased in speed and quantity
Malicious software was downloaded every ten minutes in 84 percent of the organizations under analysis. Last year, 58 percent of organizations experienced users downloading malware every two hours or less, compared with just 14 percent in 2012.

‘Unknown’ malware grows
Smarter and more resilient malware emerged in 2013. 33 percent of organizations downloaded at least one infected file with unknown malware between June and December 2013. Of those infected file types, 35 percent were PDFs. New tools called ‘crypters’ enabled malware writers to bypass detection by anti-malware software, so that organizations were hit by two pieces of unknown malware every hour – one every 27 minutes.

Bot infestations
Bot infections continued to grow, with a host infected by a bot every 24 hours. In 2013, at least one bot was detected in 73 percent of organizations, an increase from 63 percent in 2012. Organizations also struggled with containing bots, as 77 percent of bots are active for more than four weeks. Bots communicated with their ‘Command & Control’ every three minutes.

Data losses mount
Check Point found that 88 percent of organizations had experienced at least one potential data loss event, up from 54 percent in 2012. In fact, in 33 percent of the financial institutions surveyed by Check Point, credit card information was sent outside of the organization while 25 percent of healthcare and insurance institutions sent HIPAA-protected information.

Risky applications result in risky business
Use of high risk applications continued to be on the rise in 2013, with torrents, anonymisers, peer-to-peer (P2P) file sharing applications being used every nine minutes on an average day. P2P file sharing usage increased to 75 percent in 2013 from 61 percent of firms in 2012. Also, 56 percent of firms ran anonymizer proxy applications in 2013, up from 43 percent in 2012.

The Check Point 2014 Security Report is based on collaborative research from Check Point Security Checkup assessments, Check Point Threat Emulation sensors, Check Point ThreatCloud and Endpoint Security reports, and includes in-depth analysis of 200,000+ hours of monitored network traffic from 996 organizations worldwide and over 9,000 security gateways deployed across various industries.

More details.

•Date: 12th May 2014 • World •Type: Article • Topic: ISM

Business Continuity Newsletter Sign up for Continuity Briefing, our weekly roundup of business continuity news. For news as it happens, subscribe to Continuity Central on Twitter.
   

How to advertise How to advertise on Continuity Central.

To submit news stories to Continuity Central, e-mail the editor.

Want an RSS newsfeed for your website? Click here