Attacks/Breaches
7/24/2013
02:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

New Study Shows Enterprises NOT Prepared For Cyberattacks

Respondents say they have seen an uptick in more sophisticated and targeted malware attacks over the past 24 months

San Jose, Calif. – July 24, 2013 – Malwarebytes, a leading provider of anti-malware technology, today highlighted results of the recent Enterprise Strategy Group (ESG) research study focused on advanced malware protection and detection. The study revealed that enterprise organizations are seeing an increase in more sophisticated malware and are making it a strategic priority to add new layers of endpoint security to protect their organizations against advanced zero-day and polymorphic threats commonly used for targeted attacks.

Based on its survey of 315 North American-based IT security professionals working at enterprise-class organizations (1,000 employees or more), ESG found the majority of respondents have seen an uptick in more sophisticated and targeted malware attacks over the last 24 months. However, 62% of organizations surveyed said endpoint security software is not effective for detecting zero-day and/or polymorphic malware, which leaves them vulnerable to these attacks.

"As cyber-attacks become more sophisticated, IT security professionals are realizing that relying on only one layer of endpoint security isn't enough. Each endpoint needs multiple layers of malware detection to ensure complete protection," said Marcin Kleczynski, CEO of Malwarebytes. "The reality is, most anti-virus products will miss nine out of ten zero-day malware threats, and having a layered approach blocks advanced threats that traditional antivirus scanners may fail to detect."

Moreover, the study found that the most likely avenue for a malware attack, and cause for successful malware attacks, was lack of user knowledge about cyber security risks. IT security professionals surveyed believe an employee clicking on an infected URL posted within an e-mail was the most likely vector for malware to infiltrate their organizations. Other likely avenues for malware to compromise an organization's system included employees opening an infected e-mail attachment and unwittingly clicking on an infected URL while surfing the web.

"When it comes to managing malware risk, enterprises would be best served by implementing a layered approach using proactive and reactive lines of defense through their networks. Antivirus software plays a key role in protecting organizations, but it should not be the only method used to deter malware attacks," said Jon Oltsik, senior principal analyst at ESG. "Additionally, sometimes the biggest vulnerability in an organization is the computer users. Because employee actions can greatly impact computer security, educating employees on potential threats and how to avoid them should be made a priority."

In addition to uncovering these findings, the study also showed that:

29% of respondent organizations that have suffered a successful malware attack believe the increasing use of social networks is responsible for those attacks

On average, it takes 57% of respondents hours to detect a that an IT asset has been compromised by malware and 19% days

74% of enterprises have increased their security budget over the past 24 months in direct response to more sophisticated malware threats

62% of respondents believe their host-based security software is not effective for detecting zero day and/or polymorphic threats

85% of IT security professionals, given everything they know about cyber security, are concerned about some type of massive cyber-attack that could impact critical infrastructure, the economy, and/or national security

66% of U.S.-based respondents do not believe the U.S. Federal Government is doing enough to help the private sector cope with the current cyber security and threat landscape.

For more information on this survey, see the Malwarebytes blog or the survey brief by ESG here.

About Malwarebytes

Malwarebytes provides software designed to protect consumers and businesses against malicious threats that consistently escape detection by other antivirus solutions. Malwarebytes Anti-Malware Pro, the company's flagship product, employs a highly advanced behavior-based detection engine that has removed over five billion malicious threats from computers worldwide. Founded in 2008, the self-funded company is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts. For more information, please visit us at www.malwarebytes.org.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MROBINSON000
50%
50%
MROBINSON000,
User Rank: Apprentice
7/26/2013 | 6:40:19 AM
re: New Study Shows Enterprises NOT Prepared For Cyberattacks
Great findings, itGÇÖs still a realistic truth enterprises are NOT prepared for cyberattacks ! We posted an article on our blog discussing and trying to understand the behavior and unknown vulnerabilities in mobile and social environments, not only for people (a security soft spot) but also for companies http://blog.securityinnovation...
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-8626
Published: 2014-11-22
Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding...

CVE-2014-8710
Published: 2014-11-22
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.

CVE-2014-8711
Published: 2014-11-22
Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?