17 Surprising Findings From Check Point’s 2014 Security Report
by Sean Michael Kerner
2Data Loss Events Are Growing
On a year-over-year basis, Check Point found that across the industrial, finance, government and telco sectors, the percentage of organizations with at least one potential data loss event is growing.
3Malware Is Downloaded Every Two Hours
Fifty-eight percent of organizations downloaded malware every two hours or less.
4Bots Communicate More Often
Infected hosts, which become bots in a botnet, need to communicate with their comand and control center in order to get instructions. In 2013, Check Point found that the frequency of bot communications increased, with 47 percent of communications happening at least once per hour.
5Buffer Overflow Is a Leading Attack Vector
There are multiple attack vectors used today, including buffer overflow, which is a form of memory corruption.
6Microsoft Leads the List for Most Security Events by Vendor
Once again, Microsoft was the most attacked platform in 2013.
7PDFs Are the Most Common Form of Unknown Malware
Malware can use any number of different payload formats, but in 2013, Check Point found that 35 percent of unknown malware used the Adobe PDF format.
8A Third of Endpoints Are Not Fully Updated
In addition to malware threats, misconfiguration is a significant IT risk. One-third of hosts analyzed by Check Point were not running updated software versions of Flash, Java and Internet Explorer.
AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...