sb-au logo
Story image

Report finds malware downloads rise 900% - that's one every 81 seconds

01 Nov 2016

The danger of cyber threats continues to be underscored, and Check Point Technology's latest 2016 Security Report is another look into the scale and severity of attacks.

The report analysed 1.5 billion files from 1100 security checkups, 25,000 gateways and another 6000 gateways through the Threat Emulation Cloud, and found that an organisation can get hit by malware 971 times per hour - or 23,304 times per day.

The report also found that every 81 seconds a known malware is downloaded - a rise of more than 900%. Every four minutes an organisation is using a high-risk application, and every 30 seconds a threat emulation happens.

The statistics go even further in explaining how rampant threats are. Eighty-two percent of organisations had accessed malicious sites, 89% had downloaded malicious files, 88% has experienced data loss, 94% had used at least one high-risk application and 75% had an existing bot infection.

The report explains that bot infections typically communicate with command & control (C&C) servers every 52.8 seconds.

Bots and other malware tend to enact a number of actions: 18.6% steal data, 18.6% disable system security and gain remote access, 5.1% use spam to infect and re-infect systems, 3% open a back door for future attacks and 2% attempt to steal banking information.

The report also found that data loss due to malware has increased by 400%, and 44% of all infections can last more than four weeks. 

Story image
The guide to digital security in unstable times
An increase in vulnerability across different sectors has meant that 2020 has seen more than its fair share of cybersecurity incidents. One of the most effective ways to combat the perils of today’s cyber-threats is to gain a better knowledge of the threat vectors looming over the heads of organisations. More
Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More
Link image
Why performance monitoring is essential to keep cloud costs down
Cloud comes with many different associated costs, which can sneak up on organisations and drive down efficiency. Here's how to reduce costs by up to 50%.More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
McAfee finds vulnerabilities in 'temi' the videoconferencing robot
Temi is commonly used in environments including businesses, healthcare, retail, hospitality, and other environments including the home.More
Story image
Ping named identity solution Leader by ISG
Recognised for Identity & Access Management in the 2020 Provider Lens Cyber Security – Solutions & Services Quadrant Report Australia.More