Hidden security threats on enterprise networks
Posted on 22 February 2013.
Check Point uncovered the major security risks and threats that impact organizations worldwide. Their new report examines the leading security threats, the risky web applications that compromise network security, and incidences of unintentional loss of data caused by employees.


The report is based on research from 888 companies worldwide, and gives insight into the network security events that actually occurred within organizations during 2012, and the security risks that companies are exposed to.

Hidden security threats

The research revealed that 63% of organizations globally were infected with bots, and 53% were infected with new malware at least once a day as a result of existing infections on their networks. 70% of the bots detected communicated with their external command centres at least every 2 hours. 58% of command centers are based in the USA, with just 4% in China.

It also highlighted that 75% of organizations are not using the latest software versions in popular software (Acrobat Reader, Flash, Internet Explorer, Java), which can lead to security vulnerabilities. Also, 44% were not using the latest Microsoft Windows Service Packs, which include the latest Microsoft security updates.

Risky Web 2.0 applications

91% of organizations used applications with potential security risks, giving hackers an unprecedented range of options for penetrating corporate networks. 61% of organizations were found to be using P2P file-sharing, and 43% using anonymizer applications: in the majority of cases, this usage conflicted with the organization’s web usage and security policies, and can potentially open a backdoor to networks. 69% of organizations were found to be using Dropbox for cloud storage.

Data loss incidents

54% of organizations had at least one potential data loss incident as a result of emails being sent in error to an external recipient, or information being incorrectly posted online. Credit card information was the most common type of sensitive information sent outside organizations (29%), and public sector bodies and financial companies were the most likely to do this.

“Our research uncovered many alarming vulnerabilities and security threats on networks that most organizations were not aware of,” said Amnon Bar-Lev, president of Check Point. “With clearer visibility of these, IT professionals can now better define a security blueprint to protect their organizations from the constant stream of evolving security threats, ranging from botnets, to employees using risky web applications like anonymizers, to data loss.”

The complete report is available here.





Spotlight

Using Hollywood to improve your security program

Posted on 29 July 2014.  |  Tripwire CTO Dwayne Melancon spends a lot of time on airplanes, and ends up watching a lot of movies. Some of his favorite movies are adventures, spy stuff, and cunning heist movies. A lot of these movies provide great lessons that we can apply to information security.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Jul 30th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //