sb-au logo
Story image

Employees download new malware every four seconds, says Check Point

New research from Check Point has revealed that among other things,  employees download new malware every four seconds.

This finding comes after the company’s release of two research projects titled the Check Point 2016 Security Report and Exploits at the Endpoint: SANS 2016 Threat Landscape Study.

This research reveals critical challenges and key recommendations for IT leaders, as businesses continue to build-up protections against evolving cyber threats.

Check Point researchers analysed the activity of more than 31,000 Check Point gateways worldwide, which the company says revealed details on what enterprises are encountering in known and unknown malware, attack trends, and the impact of more mobile devices in the enterprise.

Researchers were also able to measure the impact successful breaches have had on organisations, and the added expenses that go beyond remediation costs.

Amnon Bar-Lev, president of Check Point, says that with billions of new connections formed every minute, the world is more globally linked than ever.

“Innovations like cloud, mobility and IoT are changing the way we deploy, the way we consume, and the way we secure technology,” he says.

“More and more malware is being put into our ecosystem that traditional security techniques are powerless to prevent,” explains Bar-Lev.  

“Given this, staying a leader requires being one step ahead of things you cannot see, know or control – and preventing attacks before they happen.”

According to Check Point, both reports present a comprehensive view of the entire threat landscape - from the network to the endpoint - offering key findings that include:

  • Unknown malware continues its exponential and evolutionary growth. Researchers found a 9x increase in the amount of unknown malware plaguing businesses. This was fuelled by the employees, who downloaded a new unknown malware every four seconds. In total, there were nearly 12 million new malware variants discovered every month, with more new malware discovered in the past two years than the previous decade.
  • Security is lagging behind the speedy, on-the-go mobile device. With smartphones and tablets accounting for 60 percent of digital media time spent, businesses’ mobile devices present both an access curse and a business productivity blessing. While employees do not want to be the cause of a company network breach, 1-in-5 will cause one through either mobile malware or malicious Wi-Fi.
  • Endpoints represent the starting points for most threats. Among the businesses surveyed, endpoints were the most common cause of breaches and the most critical component in cyber defences, with attackers leveraging email in 75 percent of cases. Also, 39 percent of endpoint attacks bypassed the network gateway firewalls, and routine operations uncovered 85 percent of threats after they had already gotten inside the enterprise.

Both reports conclude that in order for organisations to be fully prepared, they need to have a best-of-breed architecture. 

Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
Just one click – that’s all it takes to let in cyber-crime
So how do organisations ensure that users are not compromised by simply doing their work?  The answer is surprisingly simple, writes Bufferzone Security business strategist for A/NZ Greg Wyman.More
Download image
74% of APAC IT leaders say security culture is essential to business success
You can join these leaders in designing security awareness and training with your employees in mind.More
Story image
Sophos named mobile security Leader in IDC MarketScape
Sophos Intercept X for Mobile has capabilities in protecting Android, iOS and Chrome OS users from known and never before seen mobile threats.More
Story image
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.More
Link image
Why it's crucial to normalise proper security training for remote working
Knowing and implementing best practices for remote security can save money, time and headaches. It starts with a quality solution to safeguard the workforce.More