Attacks/Breaches
7/24/2013
02:20 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

New Study Shows Enterprises NOT Prepared For Cyberattacks

Respondents say they have seen an uptick in more sophisticated and targeted malware attacks over the past 24 months

San Jose, Calif. – July 24, 2013 – Malwarebytes, a leading provider of anti-malware technology, today highlighted results of the recent Enterprise Strategy Group (ESG) research study focused on advanced malware protection and detection. The study revealed that enterprise organizations are seeing an increase in more sophisticated malware and are making it a strategic priority to add new layers of endpoint security to protect their organizations against advanced zero-day and polymorphic threats commonly used for targeted attacks.

Based on its survey of 315 North American-based IT security professionals working at enterprise-class organizations (1,000 employees or more), ESG found the majority of respondents have seen an uptick in more sophisticated and targeted malware attacks over the last 24 months. However, 62% of organizations surveyed said endpoint security software is not effective for detecting zero-day and/or polymorphic malware, which leaves them vulnerable to these attacks.

"As cyber-attacks become more sophisticated, IT security professionals are realizing that relying on only one layer of endpoint security isn't enough. Each endpoint needs multiple layers of malware detection to ensure complete protection," said Marcin Kleczynski, CEO of Malwarebytes. "The reality is, most anti-virus products will miss nine out of ten zero-day malware threats, and having a layered approach blocks advanced threats that traditional antivirus scanners may fail to detect."

Moreover, the study found that the most likely avenue for a malware attack, and cause for successful malware attacks, was lack of user knowledge about cyber security risks. IT security professionals surveyed believe an employee clicking on an infected URL posted within an e-mail was the most likely vector for malware to infiltrate their organizations. Other likely avenues for malware to compromise an organization's system included employees opening an infected e-mail attachment and unwittingly clicking on an infected URL while surfing the web.

"When it comes to managing malware risk, enterprises would be best served by implementing a layered approach using proactive and reactive lines of defense through their networks. Antivirus software plays a key role in protecting organizations, but it should not be the only method used to deter malware attacks," said Jon Oltsik, senior principal analyst at ESG. "Additionally, sometimes the biggest vulnerability in an organization is the computer users. Because employee actions can greatly impact computer security, educating employees on potential threats and how to avoid them should be made a priority."

In addition to uncovering these findings, the study also showed that:

29% of respondent organizations that have suffered a successful malware attack believe the increasing use of social networks is responsible for those attacks

On average, it takes 57% of respondents hours to detect a that an IT asset has been compromised by malware and 19% days

74% of enterprises have increased their security budget over the past 24 months in direct response to more sophisticated malware threats

62% of respondents believe their host-based security software is not effective for detecting zero day and/or polymorphic threats

85% of IT security professionals, given everything they know about cyber security, are concerned about some type of massive cyber-attack that could impact critical infrastructure, the economy, and/or national security

66% of U.S.-based respondents do not believe the U.S. Federal Government is doing enough to help the private sector cope with the current cyber security and threat landscape.

For more information on this survey, see the Malwarebytes blog or the survey brief by ESG here.

About Malwarebytes

Malwarebytes provides software designed to protect consumers and businesses against malicious threats that consistently escape detection by other antivirus solutions. Malwarebytes Anti-Malware Pro, the company's flagship product, employs a highly advanced behavior-based detection engine that has removed over five billion malicious threats from computers worldwide. Founded in 2008, the self-funded company is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts. For more information, please visit us at www.malwarebytes.org.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MROBINSON000
50%
50%
MROBINSON000,
User Rank: Apprentice
7/26/2013 | 6:40:19 AM
re: New Study Shows Enterprises NOT Prepared For Cyberattacks
Great findings, itG«÷s still a realistic truth enterprises are NOT prepared for cyberattacks ! We posted an article on our blog discussing and trying to understand the behavior and unknown vulnerabilities in mobile and social environments, not only for people (a security soft spot) but also for companies http://blog.securityinnovation...
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2008-3277
Published: 2014-04-15
Untrusted search path vulnerability in a certain Red Hat build script for the ibmssh executable in ibutils packages before ibutils-1.5.7-2.el6 in Red Hat Enterprise Linux (RHEL) 6 and ibutils-1.2-11.2.el5 in Red Hat Enterprise Linux (RHEL) 5 allows local users to gain privileges via a Trojan Horse p...

CVE-2010-2236
Published: 2014-04-15
The monitoring probe display in spacewalk-java before 2.1.148-1 and Red Hat Network (RHN) Satellite 4.0.0 through 4.2.0 and 5.1.0 through 5.3.0, and Proxy 5.3.0, allows remote authenticated users with permissions to administer monitoring probes to execute arbitrary code via unspecified vectors, rela...

CVE-2011-3628
Published: 2014-04-15
Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before 0.99.7.1-5ubuntu6.5 on Ubuntu 8.0...

CVE-2012-0214
Published: 2014-04-15
The pkgAcqMetaClearSig::Failed method in apt-pkg/acquire-item.cc in Advanced Package Tool (APT) 0.8.11 through 0.8.15.10 and 0.8.16 before 0.8.16~exp13, when updating from repositories that use InRelease files, allows man-in-the-middle attackers to install arbitrary packages by preventing a user fro...

CVE-2013-4768
Published: 2014-04-15
The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB).

Best of the Web