7 Surprising Findings From Check Point's 2014 Security Report

1 - 7 Surprising Findings From Check Point's 2014 Security Report
2 - Data Loss Events Are Growing
3 - Malware Is Downloaded Every Two Hours
4 - Bots Communicate More Often
5 - Buffer Overflow Is a Leading Attack Vector
6 - Microsoft Leads the List for Most Security Events by Vendor
7 - PDFs Are the Most Common Form of Unknown Malware
8 - A Third of Endpoints Are Not Fully Updated
1 of 8

7 Surprising Findings From Check Point's 2014 Security Report

by Sean Michael Kerner

2 of 8

Data Loss Events Are Growing

On a year-over-year basis, Check Point found that across the industrial, finance, government and telco sectors, the percentage of organizations with at least one potential data loss event is growing.

3 of 8

Malware Is Downloaded Every Two Hours

Fifty-eight percent of organizations downloaded malware every two hours or less.

4 of 8

Bots Communicate More Often

Infected hosts, which become bots in a botnet, need to communicate with their comand and control center in order to get instructions. In 2013, Check Point found that the frequency of bot communications increased, with 47 percent of communications happening at least once per hour.

5 of 8

Buffer Overflow Is a Leading Attack Vector

There are multiple attack vectors used today, including buffer overflow, which is a form of memory corruption.

6 of 8

Microsoft Leads the List for Most Security Events by Vendor

Once again, Microsoft was the most attacked platform in 2013.

7 of 8

PDFs Are the Most Common Form of Unknown Malware

Malware can use any number of different payload formats, but in 2013, Check Point found that 35 percent of unknown malware used the Adobe PDF format.

8 of 8

A Third of Endpoints Are Not Fully Updated

In addition to malware threats, misconfiguration is a significant IT risk. One-third of hosts analyzed by Check Point were not running updated software versions of Flash, Java and Internet Explorer.

Top White Papers and Webcasts