Attacks/Breaches
7/24/2013
02:20 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

New Study Shows Enterprises NOT Prepared For Cyberattacks

Respondents say they have seen an uptick in more sophisticated and targeted malware attacks over the past 24 months

San Jose, Calif. – July 24, 2013 – Malwarebytes, a leading provider of anti-malware technology, today highlighted results of the recent Enterprise Strategy Group (ESG) research study focused on advanced malware protection and detection. The study revealed that enterprise organizations are seeing an increase in more sophisticated malware and are making it a strategic priority to add new layers of endpoint security to protect their organizations against advanced zero-day and polymorphic threats commonly used for targeted attacks.

Based on its survey of 315 North American-based IT security professionals working at enterprise-class organizations (1,000 employees or more), ESG found the majority of respondents have seen an uptick in more sophisticated and targeted malware attacks over the last 24 months. However, 62% of organizations surveyed said endpoint security software is not effective for detecting zero-day and/or polymorphic malware, which leaves them vulnerable to these attacks.

"As cyber-attacks become more sophisticated, IT security professionals are realizing that relying on only one layer of endpoint security isn't enough. Each endpoint needs multiple layers of malware detection to ensure complete protection," said Marcin Kleczynski, CEO of Malwarebytes. "The reality is, most anti-virus products will miss nine out of ten zero-day malware threats, and having a layered approach blocks advanced threats that traditional antivirus scanners may fail to detect."

Moreover, the study found that the most likely avenue for a malware attack, and cause for successful malware attacks, was lack of user knowledge about cyber security risks. IT security professionals surveyed believe an employee clicking on an infected URL posted within an e-mail was the most likely vector for malware to infiltrate their organizations. Other likely avenues for malware to compromise an organization's system included employees opening an infected e-mail attachment and unwittingly clicking on an infected URL while surfing the web.

"When it comes to managing malware risk, enterprises would be best served by implementing a layered approach using proactive and reactive lines of defense through their networks. Antivirus software plays a key role in protecting organizations, but it should not be the only method used to deter malware attacks," said Jon Oltsik, senior principal analyst at ESG. "Additionally, sometimes the biggest vulnerability in an organization is the computer users. Because employee actions can greatly impact computer security, educating employees on potential threats and how to avoid them should be made a priority."

In addition to uncovering these findings, the study also showed that:

29% of respondent organizations that have suffered a successful malware attack believe the increasing use of social networks is responsible for those attacks

On average, it takes 57% of respondents hours to detect a that an IT asset has been compromised by malware and 19% days

74% of enterprises have increased their security budget over the past 24 months in direct response to more sophisticated malware threats

62% of respondents believe their host-based security software is not effective for detecting zero day and/or polymorphic threats

85% of IT security professionals, given everything they know about cyber security, are concerned about some type of massive cyber-attack that could impact critical infrastructure, the economy, and/or national security

66% of U.S.-based respondents do not believe the U.S. Federal Government is doing enough to help the private sector cope with the current cyber security and threat landscape.

For more information on this survey, see the Malwarebytes blog or the survey brief by ESG here.

About Malwarebytes

Malwarebytes provides software designed to protect consumers and businesses against malicious threats that consistently escape detection by other antivirus solutions. Malwarebytes Anti-Malware Pro, the company's flagship product, employs a highly advanced behavior-based detection engine that has removed over five billion malicious threats from computers worldwide. Founded in 2008, the self-funded company is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts. For more information, please visit us at www.malwarebytes.org.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MROBINSON000
50%
50%
MROBINSON000,
User Rank: Apprentice
7/26/2013 | 6:40:19 AM
re: New Study Shows Enterprises NOT Prepared For Cyberattacks
Great findings, itGÇÖs still a realistic truth enterprises are NOT prepared for cyberattacks ! We posted an article on our blog discussing and trying to understand the behavior and unknown vulnerabilities in mobile and social environments, not only for people (a security soft spot) but also for companies http://blog.securityinnovation...
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5242
Published: 2014-10-21
Directory traversal vulnerability in functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the name parameter in a get_template action.

CVE-2012-5243
Published: 2014-10-21
functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to read arbitrary database information via a crafted request.

CVE-2012-5702
Published: 2014-10-21
Multiple cross-site scripting (XSS) vulnerabilities in dotProject before 2.1.7 allow remote attackers to inject arbitrary web script or HTML via the (1) callback parameter in a color_selector action, (2) field parameter in a date_format action, or (3) company_name parameter in an addedit action to i...

CVE-2013-7406
Published: 2014-10-21
SQL injection vulnerability in the MRBS module for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-2531
Published: 2014-10-21
SQL injection vulnerability in xhr.php in InterWorx Web Control Panel (aka InterWorx Hosting Control Panel and InterWorx-CP) before 5.0.14 build 577 allows remote authenticated users to execute arbitrary SQL commands via the i parameter in a search action to the (1) NodeWorx , (2) SiteWorx, or (3) R...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.