The 2013 Check Point Annual Security Report
The company Check Point Software Technologies Ltd has published an extensive study of the "Security Report 2013", which reveals the most serious risks that are currently facing the organization in the world. It highlights the main threats to security, Web applications, the work that could compromise the corporate network, as well as cases of data loss due to accidental employee actions.
During deployment, which began in 2012 between hackers and IT experts of "arms race" has become clear that many of the serious threat remained hidden from network administrators. These threats stem from the fact that the attackers are constantly thinking of new ways to cyber hacking, as well as reckless behavior on the Internet its own employees, who, unwittingly, make corporate networks vulnerable. Before you begin to develop an effective plan to protect security, the organization must learn and fully understand the processes that take place on their networks.
Based on data from nearly 900 companies, security report for 2013, a Check Point sheds light on what lies in enterprise networks, and the risks that organizations suffer daily.
Hidden security threats
This year, the intensity of cyber attacks in any form, from a criminal software to social and political hacktivism, only increase, and this applies to all organizations, from the largest to the smallest. The results showed that 63% of corporate network organizations were attacked bots, and more than half - Effects of malware at least once a day. The report provides a list of the most dangerous threats, including the well-known botnets, malware list (by country), the most common weaknesses in the systems (by producers), the statistics of cases of attacks such as the introduction of SQL-code (by country), and other data obtained in the study.
Unsafe web 2.0 applications
The rapid spread of Web 2.0 applications has opened unprecedented opportunities to hackers penetrating the corporate network. The study showed that 91% of organizations are using potentially unsafe applications that comprehensively covered in the report, including the frequency and scope of proxy, P2P-applications, resources and programs for storing and sharing files and the most popular social networks, each of which could open a loophole to corporate networks.
Today, corporate information has become more accessible and more mobile than ever, and it is fraught with loss or data leakage. More than half of the organizations studied had at least one case, the potential loss of data. The report describes the various data groups most at risk of loss and leakage, including information on payment cards. It also lists the industries that are most exposed to these risks of leakage.
"Our research revealed numerous weaknesses and threats to the security of networks that most organizations had no idea - said Amnon Bar-Lev, president of Check Point Software Technologies. - Awareness of them will help IT professionals to create a plan to protect companies from a continuous flow of ever-changing threats that lead to data leakage from botnets to manage employee use of Web applications, such as proxy. "