sb-nz logo
Story image

Employees download new malware every four seconds, says Check Point

New research from Check Point has revealed that among other things,  employees download new malware every four seconds.

This finding comes after the company’s release of two research projects titled the Check Point 2016 Security Report and Exploits at the Endpoint: SANS 2016 Threat Landscape Study.

This research reveals critical challenges and key recommendations for IT leaders, as businesses continue to build-up protections against evolving cyber threats.

Check Point researchers analysed the activity of more than 31,000 Check Point gateways worldwide, which the company says revealed details on what enterprises are encountering in known and unknown malware, attack trends, and the impact of more mobile devices in the enterprise.

Researchers were also able to measure the impact successful breaches have had on organisations, and the added expenses that go beyond remediation costs.

Amnon Bar-Lev, president of Check Point, says that with billions of new connections formed every minute, the world is more globally linked than ever.

“Innovations like cloud, mobility and IoT are changing the way we deploy, the way we consume, and the way we secure technology,” he says.

“More and more malware is being put into our ecosystem that traditional security techniques are powerless to prevent,” explains Bar-Lev.  

“Given this, staying a leader requires being one step ahead of things you cannot see, know or control – and preventing attacks before they happen.”

According to Check Point, both reports present a comprehensive view of the entire threat landscape - from the network to the endpoint - offering key findings that include:

  • Unknown malware continues its exponential and evolutionary growth. Researchers found a 9x increase in the amount of unknown malware plaguing businesses. This was fuelled by the employees, who downloaded a new unknown malware every four seconds. In total, there were nearly 12 million new malware variants discovered every month, with more new malware discovered in the past two years than the previous decade.
  • Security is lagging behind the speedy, on-the-go mobile device. With smartphones and tablets accounting for 60 percent of digital media time spent, businesses’ mobile devices present both an access curse and a business productivity blessing. While employees do not want to be the cause of a company network breach, 1-in-5 will cause one through either mobile malware or malicious Wi-Fi.
  • Endpoints represent the starting points for most threats. Among the businesses surveyed, endpoints were the most common cause of breaches and the most critical component in cyber defences, with attackers leveraging email in 75 percent of cases. Also, 39 percent of endpoint attacks bypassed the network gateway firewalls, and routine operations uncovered 85 percent of threats after they had already gotten inside the enterprise.

Both reports conclude that in order for organisations to be fully prepared, they need to have a best-of-breed architecture. 

Story image
BackupAssist partners with Wasabi for greater cyber-resilience
This partnership provides customers with an up to 80% less expensive solution that is faster than the competition for achieving enterprise-grade cyber-resilience, the company states. More
Story image
CompTIA forms Cybersecurity Advisory Council, led by 16 security execs
The new body will be co-chaired by Tech Data director of security solutions Tracy Holtz, and Alvaka Networks chief operating officer and chief information security officer Kevin McDonald.More
Story image
IT professionals destroying end-of-life hardware over fears of data breaches - report
IT directors are destroying end of life tech hardware as opposed to erasing its data out of fear of making a mistake and facing data breaches.More
Story image
Huawei: Corporates must focus on data minimisation and business continuity to mitigate data security challenges
"From a long-term sustainable point of view, organisations will need to adopt data minimisation and privacy by design and default."More
Story image
As digital transformation grows in A/NZ companies, misconceptions about their role in cloud security abound
While an 81% majority of A/NZ organisations are accelerating their digital transformation, a giant 99% of surveyed respondents say they believe their cloud security provider provides enough protection, according to a Trend Micro study. More
Story image
Cybersecurity strategies must involve every part of the organisation - study
In the past year, a third of the breaches incorporated social engineering techniques and the cost of a breach caused by a human error averaged to $3.33 million. More