Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    7 Surprising Findings From Check Point’s 2014 Security Report

    By
    Sean Michael Kerner
    -
    May 9, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      17 Surprising Findings From Check Point’s 2014 Security Report

      1 - 7 Surprising Findings From Check Point's 2014 Security Report

      by Sean Michael Kerner

      2Data Loss Events Are Growing

      2 - Data Loss Events Are Growing

      On a year-over-year basis, Check Point found that across the industrial, finance, government and telco sectors, the percentage of organizations with at least one potential data loss event is growing.

      3Malware Is Downloaded Every Two Hours

      3 - Malware Is Downloaded Every Two Hours

      Fifty-eight percent of organizations downloaded malware every two hours or less.

      4Bots Communicate More Often

      4 - Bots Communicate More Often

      Infected hosts, which become bots in a botnet, need to communicate with their comand and control center in order to get instructions. In 2013, Check Point found that the frequency of bot communications increased, with 47 percent of communications happening at least once per hour.

      5Buffer Overflow Is a Leading Attack Vector

      5 - Buffer Overflow Is a Leading Attack Vector

      There are multiple attack vectors used today, including buffer overflow, which is a form of memory corruption.

      6Microsoft Leads the List for Most Security Events by Vendor

      6 - Microsoft Leads the List for Most Security Events by Vendor

      Once again, Microsoft was the most attacked platform in 2013.

      7PDFs Are the Most Common Form of Unknown Malware

      7 - PDFs Are the Most Common Form of Unknown Malware

      Malware can use any number of different payload formats, but in 2013, Check Point found that 35 percent of unknown malware used the Adobe PDF format.

      8A Third of Endpoints Are Not Fully Updated

      8 - A Third of Endpoints Are Not Fully Updated

      In addition to malware threats, misconfiguration is a significant IT risk. One-third of hosts analyzed by Check Point were not running updated software versions of Flash, Java and Internet Explorer.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×